core 1

Ace your homework & exams now with Quizwiz!

TCP/IP (Transmission Control Protocol/Internet Protocol)

A collection of Internet communication protocols between two computers. The TCP protocol is responsible for an error free connection between two computers, while the IP protocol is responsible for the data packets sent over the network.

rj45

A common connector or plug used on the end of the network cable. 8 position, 8 conductor 8p8c - modular connector similar in shape to an rj48c - 8p4C, used with T1/ WAN data lines.

802. 11ac

802. 11ac approved in January 2014 - significant improvement over 802. 11n operates in the 5 gigahertz band - less crowded, more frequencies up to 160 megahertz Channel bandwidth increase Channel bonding - larger bandwidth usage dancer signaling modulation - faster data transfers eight mu - MIMO streams - twice as many streams is 802. 11n - nearly seven gigabits-per-second multi-user MIMO

proxy server

A computer system (or an application program) that intercepts internal user requests and then processes that request on behalf of the user. A proxy server is a computer system or router that functions as a relay between client and server. It helps prevent an attacker from invading a private network and is one of several tools used to build a firewall. The word proxy means "to act on behalf of another," and a proxy server acts on behalf of the user.

Hub

A device that uses its ports to connect devices (computers, printers, etc.) together multi-port repeater - traffic going in one pore is repeated to every other port everything is half duplex becomes less efficient as Network speeds increase 10 megabit/100 megabit

ISDN (Integrated Services Digital Network)

A digital circuit switching technology that carries both voice and data.

DoD Networking Model

A four-layer conceptual model describing how communications should take place between computer systems. The four layers are Process/Application, Host-to-Host, Internet, and Network Access.

#The Android Shell

A "shell" is a program that listens to keyboard input from a user and performs actions as directed by the user. Android devices come with a simple shell program. This shell program is mostly undocumented. Since many people are curious about it I thought I'd write up some documentation for it.

what is a DHCP server?

A DHCP Server is a network server that automatically provides and assigns IP addresses, default gateways and other network parameters to client devices. It relies on the standard protocol known as Dynamic Host Configuration Protocol or DHCP to respond to broadcast queries by clients. A DHCP server automatically sends the required network parameters for clients to properly communicate on the network. Without it, the network administrator has to manually set up every client that joins the network, which can be cumbersome, especially in large networks. DHCP servers usually assign each client with a unique dynamic IP address, which changes when the client's lease for that IP address has expired. When to use a router/switch as your DHCP Server There are many enterprise companies who are still using DHCP for IPv4 on their routers/switches. This is typically done by the network administrator who needs to get a DHCP capability up and running quickly but does not have access to a DHCP server. Most routers/switches have the ability to provide the following DHCP server support: a DHCP client and obtain an interface IPv4 address from an upstream DHCP service a DHCP relay and forward UDP DHCP messages from clients on a LAN to and from a DHCP server a DHCP server whereby the router/switch services DHCP requests directly. However, there are limitations to using a router/switch as a DHCP server Running a DHCP server on a router/switch consumes resources on the network device. These DHCP packets are handled in software (not hardware accelerated forwarding). The resources required make this practice not suitable for a network with a large number (> 150) of DHCP clients. Does not support dynamic DNS. The router/switch DHCP server cannot create an entry into DNS on behalf of the client based on the IPv4 address that was leased to the client. No ability to e asily manage the scope and see the current DHCP bindings and leases across multiple routers. Administrator must log into the switch/router individually to get information about DHCP bindings. No high availability or redundancy of the DHCP bindings. This could cause problems if the current DHCP server and default gateway fails. It is more difficult to configure DHCP options on router/switch platform. The DHCP service running on a router/switch is not integrated with IP address management (IPAM) for address tracking and scope utilization or security forensics. The Benefits of a dedicated DHCP Server A better approach than trying to use DHCP on your router/switch is to use a centralized DHCP server. This is particularly true for network environments that require support of both DHCP for IPv4 and DHCP for IPv6 at the same time. Virtually all DHCP server vendors support both protocols so you can use the same management interface for IPv4 and IPv6. There are several benefits that make it advantageous for an enterprise to use DHCPv6. Having a DHCPv6 server that is integrated into your IP Address Management (IPAM) system for IPv6 gives visibility to the IPv6-enabled client nodes. You also would want this same functionality for IPv4. As IPv4 address space becomes increasingly constrained, you will want to keep track of your DHCP scopes and determine if your lease time is adequate with the plethora of BYOD systems joining your networked environment. DHCP servers provide logging and management interfaces that aid administrators manage their IP address scopes. Your organization will want an accounting of what is on your network regardless of IP version being used. DHCP servers can provide redundancy and high availability. If one DHCP server were to fail, the clients will preserve their current IP addresses and not cause an interruption for the end-nodes. Organizations will prefer a DHCPv6 server that has been tried and tested. For example, The Infoblox DHCPv6 server has been certified as "IPv6 Ready" by the USGv6 certification laboratory. Organizations that are beginning to implement IPv6 should migrate DHCP for IPv4 scope off the routers/switches and put them on a robust DHCP server infrastructure. This change will also mean that your organization would want to have DHCP operate the same for both protocols. Enterprise organizations will want to take advantage of the centralized dual-protocol DHCP server to provide IPv4 and IPv6 addresses to client devices.

SOHO Router (Small Office/Home Office)

A SOHO router is a broadband router built and marketed for small offices and home offices. Since the workload for these types of businesses is primarily on the internet, they require a local area network (LAN), which means their network hardware is structured specifically for that

Bridge (networking)

A network bridge is a computer networking device that creates a single aggregate network from multiple communication networks or network segments. This function is called network bridging. Bridging is distinct from routing.

HTML5

A new version of Hypertext Markup Language expected to be finalized in Fall 2014.

Workstation

A personal computer located on a network

WAN link

A point-to-point connection between two nodes on a WAN.

sata serial AT attachment

A popular bus used to connect hard drives and other mass storage devices to the computer. sata revision 1.0 - saddle 1.5 gigabit per second one meter sata revision 2.0 -sata 3.0 gbit/s, 1 meter. SATA revision 3.0 - SATA 6.0 Gbit/s, 1 meter SATA revision 3.2 -sat 16 Gbit/s 1 meter

infrared port

A port that enables devices to exchange data without using cables. Usually, you'd attach a dongle to a serial port, but with infrared ports, you can place the devices across from each other (so the infrared ports are facing) and "beam" your info instantaneously.

Z-Wave

A short-range low-power network technology used for the Internet of Things.

What is mini PCI Express?

A small version of the Mini PCI peripheral interface for laptops and mobile devices. Using PCI Express signaling, Mini PCI Express (mPCIe) was originally designed for graphics cards and other peripherals but was later used for storage. The cards plug directly into the motherboard.

DMZ Server

In computer security, a DMZ or demilitarized zone is a physical or logical subnetwork that contains and exposes an organization's external-facing services to an untrusted, usually larger, network such as the Internet.

lpd

Line Printer Daemon

Syslog server

A type of server used for collecting system messages from networked devices

1000BaseX

An umbrella Gigabit Ethernet standard. Also known as 802.3z. Comprises all Gigabit standards with the exception of 1000BaseT, which is under the 802.3ab standard. 10 Gbps.

node (network)

And then the last 64 bits of the address are the node or the network address of the device.

ADSL

Asymmetric Digital Subscriber Line

contiguous block

Contiguous memory allocation allocates consecutive blocks of memory to a file/process. Non-Contiguous memory allocation allocates separate blocks of memory to a file/process.Jun 28, 2020

configuring vlans

Create a new VLAN and give it a name: SW1(config)# vlan 10 SW1(config-vlan)# name SALES local area Networks - a group of devices in the same broadcast domain

DNS

Domain Name System

DHCP

Dynamic Host Configuration Protocol

DHCP

Dynamic Host Configuration Protocol 67-68 This is a protocol that will automatically configure the IP addressing for your device.

DHCP

Dynamic Host Configuration Protocol UDP ports 68-67

Electro photographic

EP

EULA

End User License Agreement

APIPA (Automatic Private IP Addressing)

Feature of Windows that automatically assigns an IP address to the system when the client cannot obtain an IP address automatically. Automatic Private IP Addressing (APIPA) is a feature of Windows-based operating systems (included in Windows 98, ME, 2000, and XP) that enables a computer to automatically assign itself an IP address when there is no Dynamic Host Configuration Protocol (DHCP) server available to perform that function.

GMII:

Gigabit Media Independent Interface. An interface between the MAC device and the physical layer.

GPS

Global Positioning System

GSM

Global System for Mobile Communications

ntp servers

Google's turned on a set of public network time protocol (NTP) servers. You'll find the servers at time.google.com - which resolves to 216.239. 35.0, a rather less pretty IP address than the 8.8. 8.8 and 8.8.

HTTP/HTTPS

HTTP is unsecured while HTTPS is secured. HTTP sends data over port 80 while HTTPS uses port 443. HTTP operates at application layer, while HTTPS operates at transport layer. No SSL certificates are required for HTTP, with HTTPS it is required that you have an SSL certificate and it is signed by a CA.

multi-port repeater

HUB

physical layer 1 physical structure land-based layer Central device protocol;

HUB

downward compatible

Hardware or software that is compatible with earlier versions of the product. Also called "downward compatible." Contrast with forward compatible.

static

Having no motion or change

3G networks

High-speed cellular networks based on packet-switched technology, enabling users to transmit video, graphics, and other rich media in addition to voice.

HTML

Hypertext Markup Language

Node

In a network, a connection point; in a hierarchical database, a segment or record type.

MPLS

Multi-Protocol Label Switching

QoS

Quality of Service Quality of Service (QoS) is a set of technologies that work on a network to guarantee its ability to dependably run high-priority applications and traffic under limited network capacity. QoS technologies accomplish this by providing differentiated handling and capacity allocation to specific flows in network traffic.

RFCs Memos in the RFC document series contain technical and organizational notes about the Internet.

RFCs cover many aspects of computer networking, including protocols, procedures, programs, and concepts, as well as meeting notes, opinions, and sometimes humor. Below are links to RFCs, as available from ietf.org and from rfc-editor.org. Note that there is a brief time period when the two sites will be out of sync. When in doubt, the RFC Editor site is the authoritative source page.

RFID

Radio Frequency Identification

ram pc133

Random Access Memory 133 megahertz equals the speed at which it operates 8 by wide bus 133 megahertz x 8 x equals 1066 mb/s although 133 * 8 equals 1064 1066 is accurate because one 33.3 333 * 8 equals 1066

RX:

Receive. The hardwired location of data arriving into a component.

RGMII:

Reduced Media Independent Interface. A standard which was developed to reduce the number of signals required to connect a PHY to a MAC.

RMII:

Reduced Media Independent Interface. A standard which was developed to reduce the number of signals required to connect a PHY to a MAC.

raid

Redundant Array of Independent Disks - they're also inexpensive discs different raid levels - some redundant, some not RAID 0 - striping raid 1 - mirroring raid 5 - striping with parity nested raid raid 1 + 0 AKA RAID 10 - a stripe of mirrors

RAS

Remote Access Service

RDP

Remote Desktop Protocol TCP port 3389 provides remote control functionality available on many different Windows servers it allows either the whole desktop of the other server to be viewed or just an application that's running on the server to be viewed.

Repeater

Repeaters are network devices operating at physical layer of the OSI model that amplify or regenerate an incoming signal before retransmitting it. They are incorporated in networks to expand its coverage area. They are also known as signal boosters.Jul 5, 2019

SMTP

Simple Mail Transfer Protocol

TCP Ports

Specify a source and destination port number in their segment headers. A port number is a 16-bit unsigned integer, thus ranging from 0 to 65535.

IMAP4 (Internet Message Access Protocol, version 4)

TCP port 143

TACACS+ runs on TCP port: 389 49 636 88

Terminal Access Controller Access Control System Plus

DNS server Domain Name System

The Domain Name System is a hierarchical and decentralized naming system for computers, services, or other resources connected to the Internet or a private network. It associates various information with domain names assigned to each of the participating entities.

802.1Q

The IEEE standardized protocol for VLAN trunking.

forward compatible

The ability of an older system to operate in harmony with a new system.

Configuration Management

The administration of setup and changes to configurations.

LAN

Local Area Network "We define this as a group of devices that happen to share the same broadcast domain. For example, we have two switches on our network. The switch on the left and all of the devices connected to that switch are one broadcast domain. And we have a switch on the right, and there's devices connected to that switch. Those devices are on a different broadcast domain." Professor Messer

MAC:

Media Access Control. A sublayer that provides flow control and multiplexing for the transmission medium. The MAC sublayer and the logical link control sublayer together make up the data link layer.

Dynamic Random Access Memory dram

Memory built as an integrated circuit; it provides random access to any location. the memory on the DIMM dynamic - needs constant refreshing - without refreshing, the data in memory disappears Random Access - any storage location can be accessed directly - unlike magnetic tape.

MAN

Metropolitan Area Network

hexadecimal

The hexadecimal number system is base 16, using only digits 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, and F.

Data link layer:

The second layer of the seven-layer OSI model of computer networking.

Packet Switched Network

The type of network in which relatively small units of data are routed through a network based on the destination address contained within each datagram.

BRI

There are two different types of ISDN you might find. One is what we call an ISDN basic rate interface, or BRI. You'll sometimes hear this referred to as a 2B+D.

Latency

Time it takes for a bit to travel from its sender to its receiver.

TCP

Transmission Control Protocol host to host, flow control message segmentation, message acknowledgement, message traffic control, session multiplexing. part of the "transport layer"

TX:

Transmit. The hardwired location of data leaving a component.

unshielded shielded cable

UTP unshielded twisted pair - no additional shielding - the most common twisted-pair cabling STP shielded twisted pair - additional shielding protects against interference - filled each pair and/or the overall cable - requires a cable to be grounded abbreviations -U= unshielded -S= braided shielding -F= foil shielding overall Cable/individual pairs TP - braided shielding around the entire cable and foil around the pairs is s/FTP - soil around the cable and no shielding around the parish is f/UTP

UTM device

Unified Threat Management

MAC address

Unique address embedded in network connected devices.

unmanaged switch

Unmanaged switches are plug and play devices without the need of a complex setup. These switches allow Ethernet devices to communicate with one another (such as a PC or network printer) by providing a connection to the network and passing on information to where it needs to go.

UTP:

Unshielded Twisted Pair. A type of twisted pair cabling.

VPN

Virtual Private Network

vpn

Virtual Private Network

PROCESS DOD4 CHART

application, presentation, session,

MIMO

multiple-input multiple-output

RFID

radio frequency identification, similar to barcodes

ram sizes

range 128mb to 32 gb

network prefix

the first half or the first 64 bits of the address, are generally referred to as the network prefix.

proxy server

the proxy server is an intermediate server that sits between you and some other third party resource. Since this proxy sits in the middle of the communication, it's a perfect place to perform some security functions. For example, it's very common to do access control, malware scanning, and content filtering on the proxy server.

twist rate copper cabling

the rate at which wires inside of a copper Twisted wire pair cabling is Twisted

RAID 10 1 + 0 stripe of mirrors

the speed of striping, the redundancy of Mirroring - The Best of Both Worlds need at least four drives

frequencies

the tone or level of sound vibrations

USB 1.1 - 2.0 connectors

there are multiple different connectors associated with the USB 1.1 - 2.0 connector standard - standard a plug - standard B plug - mini B plug - micro-b plug

traversing

to pass or move over, along, or through

attenuate

to reduce in force or degree; to weaken

DNS server

translates the domain name into its associated IP address domain name server

optical fiber communication

transmission by light - the visible spectrum light instead of radio frequency signals no RF signal - very difficult to monitor or tap signal slow to degrade - transmission over long distances immune to radio or electrical interference - there is no RF

HOST TO HOST DOD4 CHART

transport

Loopback plugs check input/output functions by connecting transmission pins to receive pins to see if the port is physically working properly

useful for testing physical - or folding your applications serial/rs-232 9 pen or 25 network connections - ethernet, T1, fiber these are not crossover cables

application layer 7, end-user layer. Central device / protocols.

user applications. SMTP. (simple mail transfer protocol)

3G Technology

uses cellular radio technology to provide users with high-speed internet connections, as long as they are within the networks range 3rd generation - introduced in 1998 upgraded data connectivity over 2G - incremental 3-g updates improve speeds - usually several megabits per second bandwidth Improvement allowed new functionality - GPS - mobile television - video on demand - video conferencing

development environment/server

A development server is a type of server that is designed to facilitate the development and testing of programs, websites, software or applications for software programmers. It provides a run-time environment, as well as all hardware/software utilities that are essential to program debugging and development.

PoE injector

A device that adds power to an Ethernet cable so the cable can provide power to a device.

VPN concentrator

A device that aggregates hundreds or thousands of VPN connections.

proxy firewall

A proxy server that also acts as a firewall, blocking network access from external networks.

DevOps

An approach based on lean and agile principles in which business owners and the development, operations, and quality assurance departments collaborate.

CRU

CRU Stands For : Compressed file archive (CRUSH)

100BaseT

Ethernet cabling system designed to run at 100 Mbps on twisted pair cabling. It uses baseband signaling. No industry-standard naming convention exists, so sometimes it's written 100BASE-T or 100Base-T.

OSI:

Open Systems Interconnection is a conceptual model that characterizes and standardizes the communication functions of a telecommunication or computing system without regard to its underlying internal structure and technology.

destination Mac address

In any packet transmitted over Ethernet there are two MAC-addresses present: one is a source MAC-address and another is a destination MAC-address. When forwarding data, Ethernet-switches use this important data.

OLED

Organic Light Emitting Diode.

PAN

Personal Area Network

zero configuration

This means that instead of you manually creating port forwarding rules, you can have applications communicate directly to your router to enable or disable the access for certain port numbers.

Layer 3 Devices and Their Functions

The network layer provides connectivity and path selection between two host systems that might be located on geographically separated networks. In the case of a host, this is the path between the data link layer and the upper layers of the NOS. In the case of a router, it is the actual path across the network.

Non-ephemeral port group (permanent)

0 - 1,023

WEP

Wired Equivalent Privacy

Non-ephemeral port group (permanent)

0 - 1,023 "Ephemeral means temporary, so these would be non-temporary ports, or permanent port numbers." Professor Messer

the seven layers of the OSI model forwards.

1. physical 2. data link 3. network 4. transport 5. sessions 6. presentation 7. application

How fast is 1000Base-T?

1 Gbps

Fast Ethernet can be implemented in three different transmission schemes or cabling options:

100BASE-TX: The most popular Fast Ethernet implementation. 100BaseTX uses two pairs of wires in Category 5 cabling; that is, the same cabling as the popular but lower-speed 10BaseT variety of Ethernet. 100BASE-FX: A duplex multimode fiber-optic cable with ST connectors used mainly for backbone wiring. 100BASE-T4: Uses four pairs of wires and enables Fast Ethernet to be used over category 3 cabling or higher.

DDR3 RAM pins

240 DDR3 twice as fast as ddr2 also has 240 pens bottom notches are different places not interchangeable with DDR ddr2 or ddr4 an example would be DDR3 - 1600 megahertz PC3 12800 2GB SD ram

Network Address Translation (NAT)

A technique that allows private IP addresses to be used on the public Internet.

network address

A unique identifying number for a network node that follows a hierarchical addressing scheme and can be assigned through operating system software. Network addresses are added to data packets and interpreted by protocols at the Network Layer of the OSI model.

gigabit

Also called 1000Base-T, this networking standard supports speeds up to 1 Gbps. (13)

lightning

Apple proprietary - 8 Pin digital signals - iPhone, iPad, iPod devices some advantages over micro USB - higher power output for phones and tablets - can be inserted either way - simpler design, more durable

lightning

Apple proprietary - 8 pan digital signals - iPhone iPad iPod devices some advantages over micro USB - higher power output for phones and tablets - can be inserted either way - simpler design, more durable data power

asic

Application Specific Integrated Circuit

all people seem to need data processing

Application, Presentation, Session, Transport, Network, Data Link, Physical

Full-duplex communication

Both devices can transmit and receive on the media at the same time.

CDMA

Code Division Multiple Access

cfl

Compact Fluorescent Light

Ga (video graphics array)

DB-15 Connector -More accurately called DE-15 BLUE COLOR -pc system design guide Analog signal -no digital -image degrades after 5 to 10 meters 15 pin connector is the VGA connector

DMZ

Demilitarized Zone "If you're enabling the DMZ function, you're effectively opening up that device to the internet." Professor Messer

ECC Memory

Error Correcting Code Memory -Detects errors and corrects on the fly -Not all systems use ECC Looks the same as Non-ECC memory detox if the data was correctly processed by the memory module make the correction if it needs to you can tell whether a chip is ECC or non ECC by the number of pins that are on the module in a non ECC memory module it will have eight memory chips in an ECC memory module it will have nine memory chips most Ram modules are non-ecc this is because non ECC Ram is more stable ECC Ram is used more in servers

eSATA

External Serial Advanced Technology Attachment eSATA sata

Packets ("letter", contains IP address )

Network layer 3 routing, subnet traffic control, frame fragmentation, logical physical address mapping, subnet usage accounting.

fortinet

Fortinet is an American multinational corporation headquartered in Sunnyvale, California. It develops and markets cybersecurity products and services, such as firewalls, anti-virus, intrusion prevention and endpoint security. Fortinet was founded in 2000 by brothers Ken Xie and Michael Xie. Wikipedia

Gateway Central device protocols

Gateway can be used on all layers

aggregate

Gathered into a whole; total

fe80:0000:0000:0000:5d18:0652:cffd:8f52

If there leading zeros- such as 0652- you can simply state that as 652, as an abbreviation.

Layer 1 - Devices and Their Functions

Layer 1 defines the electrical, mechanical, procedural, and functional specifications for activating, maintaining, and deactivating the physical link between end systems. Some common examples are Ethernet segments and serial links like Frame Relay and T1.

Apple Filing Protocol

Mac OS file transfers TCP 548

power over ethernet

Poe power provided on an ethernet cable - 1 wire for both Network and electricity - phones cameras wireless access points useful and difficult to power areas power provided at the switch - built-in power- endspans - inline power injector mid-spans

NetBIOS (Network Basic Input/Output System)

Protocol that operates at the Session layer of the OSI seven-layer model. This protocol creates and manages connections based on the names of the computers involved.

snmp

Simple Network Management Protocol udp 161

Loopback plugs check input/output functions by connecting transmission pins to receive pins to see if the port is physically working properly

These are used to send traffic going out of a particular interface, loop them around, and send them back into that same interface. The type of loopback plug that you'll use will depend on the type of interface that you're connecting to. For example, you can have serial or RS-232 loopback plugs, some that are nine-pin and some that are 25-pin. There are separate loopback plugs that you would use for ethernet, T1, or even fiber connections. But the important thing to remember is that these are looping back traffic from one interface back into the same interface. These are not crossover cables, which allow us to connect different devices to each other.

TQFN:

Thin Quad Flat Pack.

3g

Third generation wireless communication technology allows high speed wireless data transfer

This means that other devices on your network can automatically configure your SOHO router and make changes to the configuration at any time.

This is Universal Plug and Play.

UPnP

This is Universal Plug and Play.

line-of-sight internet service

This is a wireless internet service that's able to provide access over a very wide geographical area

electrician scissors

What are electricians scissors for? The scissors are designed with a serrated surface on the back of the blade to clean wires and a stripping notch to help you quickly strip wires when the need arises. They are ideal for telephone wires and other electrical service applications.

SOHO router

What device usually has the functions of a router, switch, DCHCP server, and wireless access point? and all in one device - modem, router, switch, Wireless AP, firewall, Etc.

tools to allow us to see the network itself

Wi-Fi analyzer

at motherboard

a printed circuit board containing the principal components of a computer or other device, with connectors into which other circuit boards can be slotted.

Layer 5: Session layer

allows session establishment between processes running on different stations.

end-user device configuration

automatic - Auto speed and duplex - DHCP addressing

twisted pair copper cabling

balanced pair operation - two wires with equal and opposite signals - transmit+, transmit-/ receive+, receive- The Twist is the secret! - keeps a single wire constantly moving away from the interference - the opposite signals are compared on the other end pairs in the same cable have different twist rates

Cable Motem

broadband -transmission across multiple frequencies - different traffic types data on the cable network - DOCSIS data over cable service interface specification high speed networking - 4 megabits through 250 megabits are common - gigabit speeds are possible

F-Connector (Coaxial)

cable television - cable modem RG6 or rg59 - threaded connector

F-Connector (Coaxial)

cable television - cable modem RG6 or rg59 cable threaded connector

using the tone generator and probe

easy wire tracing - even in complex environments connect the tone generator to the wire - modular Jack - coax - punch down connectors use the probe to locate the sound - the two tone sound is easy to find you take the inductive probe and you touch it to each one of the cable wires and when you touch the wire that has the tone generator on the other end the inductive probe Pro part starts beeping and blinking

network cabling standards

electronic Industries Alliance (EIA) standard start with r s - #( recommended standard) or EIA-# -http://www.eia.org telecommunications industry Association (TIA) -STANDARDS, MARKET ANALYSIS, trade shows, government Affairs, Etc. ANSI/TIA/EIA-568 - commercial building telecommunications cabling standard -http://www.tiaonline.org International ISO/IEC. 11801 cabling standards - Define cabling standards no matter where they happen to be in the world

Frames ("envelopes contains Mac address) NIC card- switch- NIC card end-to-end

data link layer 2. establishes and terminates The Logical link between nodes, frame traffic control, frame sequencing, frame acknowledgement, frame delimiting, frame error checking, media Access Control.

NETWORK DOD4 CHART

data link, physical,

DOCSIS

data over cable service interface specification.

monitor

display consisting of a device that takes signals from a computer and displays them on a CRT screen

DVI digital visual interface

dvi-d single-link

SMB

server message block or small to midsize business

Media Access Control address

What is used to identify network nodes on a physically connected network?

WPA

Wireless Protected Access

layer 4: transport layer

ensures that messages are delivered error-free. in sequence and with no losses or duplications.

double data rate to ddr2 sdram

faster speeds - twice as fast as DDR not backwards compatible - ddr2 won't work in DDR slots

layer 6: Presentation

formats the data to be presented to the application layer. it can be viewed as the " translator" for the network.

LANs

local area computer networks - a group of devices in the same broadcast domain

LAN

local area network

Session - layer 5 synch and send to ports.(logical ports) Central device protocols:

logical ports, rpc, sql, nfs netbios names.

4G LTE (Long Term Evolution)

long term evolution LTE - a "4G" technology - convert standard (GSM and CDMA providers) - based on gsm and Edge enhanced data rates for GSM evolution - standard supports download rays of up to a hundred 50 megabits per second lte-advanced LTE-A - standard supports download rate of 300 megabits per second

SDR VS DDR

look at a comparison of the clock Cycles ddr 2 bits of data as opposed to 1 bit of data

ram rambus in-line memory module has 184 pins

looks similar to Dimms bottom notches are near the center of the module debuted in 1999 was a breakthrough in the speed of memory

mobile on desktop

lower power requirements less heat generation

endpoint management server

manage all devices from one pane of glass - software installations - driver installations - software update - security patches - remote troubleshooting requires an agent on the device - server sends the command - agent executes the commands

cable modem

a broadband modem that sends and receives digital data over the CATV network broadband - transmission across multiple frequencies - different traffic types data on the "cable" Network -DOCSIS ( data over cable service interface specification) high speed networking - 4 megabits through 250 megabits are common. - gigabit speeds are possible multiple services - data, voice, video

DNS server

a computer or a group of computers that maintain a database to enable a computer to know the IP address of a URL

Web Server

a computer that delivers requested webpages to your computer or mobile device respond to browser - using standard web browsing protocols - HTML and HTML5

Web Server

a computer that delivers requested webpages to your computer or mobile device respond to browser - using standard web browsing protocols - HTML and HTML5 web pages are stored on the server -downloaded to the browser - static Pages or belt dynamically in real time

Web Server

a computer that delivers requested webpages to your computer or mobile device respond to browser request - using standard web browsing protocols - HTML, HTML5 web pages are stored on the server - downloaded to the browser - static Pages or built dynamically in real time

augmented reality

a technology that superimposes a computer-generated image on a user's view of the real world, thus providing a composite view. When it is superimposed over what the user is viewing in the real world, it is AR.

Wireshark Protocol Analyzer Software

software that allows for monitoring of the OSI layers and issues within those layers.

software raid vs. Hardware raid

software-based raid - a feature of the operating system - doesn't require any special Hardware - usually lower performance than hardware-based hardware-based raid - a feature of the hard drive controller - configured outside of the OS . usually invisible to the operating system - high-performance, designed for speeds

predecessor

someone or something that came before another

multimeter

ac voltage - check wall outlet voltage DC voltage - PC power supply output voltages - CMOS battery power continuity - cable connectivity - fuse status - wire mapping

802. 11b

also an original 802. 11 standard - October 1999 operates in the 2.4 gigahertz range 11 megabits per second mbit/S better range than 802. 11a - less absorption problems more frequency conflict - baby monitors cordless phones microwave ovens Bluetooth

802. 11 G

and "upgrade" to 802. 11b - June 2003 operates in the 2.4 gigahertz range 54 megabits per second mbit/S - same as 802. 11a but a little bit less thoroughput backwards compatible with 802. 11b same frequency conflict problems 802. 11b

End User Layer

application layer( layer 7) program that opens what was sent or creates what is to be sent resource sharing, remote file access, remote printer access, directory services call my network management.

double data rate for ddr4 sdram

speed increases over DDR3 - faster frequencies - maximum 64 gigabit per DIMM again no backwards compatibility

USB 1.1/2.0 connectors

standard a plug standard B plug mini B plug micro-b plug

URL

the address of a web page. "type a URL into a browser's address bar" Stands for "Uniform Resource Locator." A URL is the address of a specific webpage or file on the Internet. http:// - the URL prefix, which specifies the protocol used to access the location. ... techterms.com - the server name or IP address of the server.Nov 24, 2015

wireless LAN controllers

centralized management of WRAps - a "pane of glass" management functions - deploy new access points - performance and security monitoring - configure and deploy changes to all sites - report on access point use usually a proprietary system - the wireless controller is paired with the access points can also be cloud-based - manage the console from anywhere

DB9 serial cable connector

d sub miniature or d sub - different sizes, a through e - da15 - db25 - DC 37 -DD 50 - de9 commonly used for rs-232 - recommended standard 232 - and Industry standard since 1969 serial communication standard - belt for modem communication . used for modems, printers, mice, networking

frequency test

with uniformity, expect roughly the same number of digits Field testing of medium- and high-voltage cables may be performed for various reasons, such as acceptance after installation, charting the gradual deterioration of insulation over time, verification of splices and joints, and for special repairs. This assessment applies to both the cable itself, as well as the associated accessories (splices and terminations) — referred to as the "cable system."

IDS

Intrusion Detection System

IPS

Intrusion Prevention System

managed switches

VLANS support - interconnect with other switches via 802.1q (trunk) traffic prioritization - voice traffic gets a higher priority redundancy support - spanning tree protocol STP external management - simple Network management protocol SNMP Port mirroring - capture packets

plenum - rated cable

traditional cable jacket - polyvinyl chloride PVC fire - rated cable jacket - fluorinated ethanol polymer fep or low- smoke polyvinyl chloride PVC plenum rated cable may not be as flexible - may not have the same Bend radius worst-case planning - important concerns for any structure

An example subnet mask is one, like, 255.255.255.0. This is a value that's used by the local device to determine what IP subnet it happens to be on.

what does that subnet mask or IP address tell a person that makes it valuable to be used by the local device to determine what IP subnet it happens to be on?

RJ45

A common connector or plug used on the end of the network cable.

Internet Protocol (IP)

A communication standard that enables computers to route communications traffic from one network to another as needed.

1000BaseSX

A Gigabit Ethernet standard using multimode fiber cabling, with a 220- to 500-m maximum cable distance.

LAN:

A computer network that interconnects computers within a limited area such as a residence, school, laboratory, university campus, or office building.

110 block

A 110 block is a type of punch block used to terminate runs of on-premises wiring in a structured cabling system. The designation 110 is also used to describe a type of insulation displacement contact connector used to terminate twisted pair cables, which uses a punch-down tool similar to the older 66 block. "And in that closet is a patch panel. This patch panel terminates those wires onto what we call a 110 block and provides, inside of that closet, a set of RJ45 connectors that go all the way back to each person's individual desk." Professor Messer

Inverter

A device that converts DC to AC.

Multimeter

A measuring instrument for current, voltage, and resistance "This can provide voltage and continuity settings. For example, you can plug into a power source that's providing AC power and measure exactly how many volts of AC power is coming from that connection. " Professor Messer The "multi" in multimeter means that it does more than one thing. You've got a number of different voltages and settings that you can check for. And of course, you can check for DC voltage as well. So if you'd like to check the voltage coming from a laptop power supply or PC power supply, or you'd like to see how many volts are available in a battery, the multimeter is a great tool to use.

data center

A data center is a facility that centralizes an organization's shared IT operations and equipment for the purposes of storing, processing, and disseminating data and applications. Because they house an organization's most critical and proprietary assets, data centers are vital to the continuity of daily operations.

Megahertz (MHz)

A million cycles per second; a measurement used to express a computer system's clock speed or clock rate.

modular connectors

A modular connector is a type of electrical connector for cords and cables of electronic devices and appliances, such in computer networking, telecommunication equipment, and audio headsets. also looks like the plug that used as a regular phone plug in also known as the rj11

lcd bezel

A monitor bezel, or screen bezel, is the area of a display that surrounds the screen. ... For example, old CRT monitors often had bezel widths of two inches or more, while modern LCD displays often have bezels that are less than one inch thick.

port mirror

A monitoring port on a switch. All traffic going through the switch is also sent to the port mirror. "This allows you to connect a network analyzer to one of the ports on the switch and copy traffic from any other port on that switch to watch the traffic flows across the network." Professor Messer.

Wireshark--Protocol Analyzer Software

Wireshark is a packet sniffer and analysis tool. It captures network traffic on the local network and stores that data for offline analysis. Wireshark captures network traffic from Ethernet, Bluetooth, Wireless (IEEE.)

SSID

Service Set Identifier. Identifies the name of a wireless network. Disabling SSID broadcast can hide the network from casual users but an attacker can easily discover it with a wireless sniffer. It's recommended to change the SSID from the default name.

Dual Band

The capability of a communications device, such as a router, to use two communications frequencies. ie 2.4 gigahertz and 5 gigahertz bandwidth

megabit

a unit of data size or (when expressed per second) network speed, equal to one million or (strictly) 1,048,576 bits.

SDRAM

synchronous D Ram sdram sdram is synchronous with the common system clock. - queue up one process while waiting for another - classic DRAM didn't wait for a signal.

SDRAM

synchronous dynamic random access memory could be labeled PC 100 the label 100 equals=100 MH the speed at which it operates 8 byte wide bus 100 megahertz * 8 bytes equals= 800 megabytes per second so the total bandwidth is equal to 800 megabytes per second

rj11

connectors are used with telephone cables. 6 position 2 conductor 6p2c - rj14 uses 6p for C4 dual-line use telephone connection

Hop Networking

"A hop is a computer networking term that refers to the number of routers that a packet (a portion of data) passes through from its source to its destination. Sometimes a hop is counted when a packet passes through other hardware on a network, like switches, access points, and repeaters." lifewire https://www.lifewire.com/what-are-hops-hop-counts-2625905

IP version 4

(IPv4) the version of TCP/IP that has been most widely implemented on modern networks

RADIUS (UDP)

(Remote Authentication Dial-In User Service)

SSL

(Secure Socket Layer) A protocol designed by Netscape Communications to enable encrypted, authenticated communications across the Internet.

Power over Ethernet

- A option in some devices to provide power to a device through the twisted pair CAT5 connection or higher. - Generally found on a switch based on hardware specifications. PoE= power over ethernet Power over ethernet allows us to power device using our ethernet cables.

ZigBee

- 802.15.4 - Low cost cable replacement technology - Close to 100M nodes in 2012 - Honeywell = HVAC systems - Zigbee used for low power consumption and rely on long, multi-year battery life

ZigBee

- 802.15.4 - Low cost cable replacement technology - Close to 100M nodes in 2012 - Honeywell = HVAC systems - Zigbee used for low power consumption and rely on long, multi-year battery life Internet of Things networking- open standard - IEEE 802. 15.4 pan alternative to Wi-Fi and Bluetooth - longer distances than Bluetooth - less power consumption in Wi-Fi mesh network of all zigbee devices in your home - light switch communicates to light bulbs - tell Amazon Echo to lock the door uses the i s m BAND - industrial, scientific, and medical - 900 megahertz and 2.4 gigahertz frequencies in the US

UDP Ports

- DNS (53) - Bootp/DHCP (67 and 68) - TFTP (69) - Network Time Protocol (NTP) (123) - NBT (137-139) - SNMP (161 and 162) - Network File Share (Unix) (2049) - Syslog (514) (TCP or UDP)

end-user device can figures based on router

- IP address - subnet mask -default gateway - DNS servers

every SCSI device on a single bus is assigned a separate ID number

- SCSI ID 0 SCSI controller, ID to hard drive, ID 3 CD ROM drive. logical units Luns are defined within each SCSI ID - separate drives in a storage array or virtual machine the signal at the quotation mark in "of a physical SCSI bus is terminated - can we internal to the device or a separate termination device serial attached SCSI SAS device have no jumpers, Terminators, or settings. move from parallel to serial - increase throughput - similar to the move from Pata to sata point-to-point connection - no more Daisy chains no termination required - the boss has two devices on it the control and management of SCSI - the speed of a serial connection.

subnet mask

- This network setting dictates which portion of the IP address is available within a network addressing schematic.

USB 3.0 connectors

- USB 3.0 standard B plug - USB 3.0 standard a plug - USB 3.0 micro-b plug

PATA Cabling

- motherboard connection - 40 wire device zero Master device one slave on an 80 wire cable it would be reversed from the 40 wire cable the slave would be one and the bastard would be zero where is with the 40 wire the slave would be zero and the master would be one - 80 wire device 1 slave device zero master

line of sight services

-High frequency visual path between antennas -Common in metropolitan areas -WiMAX networking - worldwide interoperability for Microwave Access line of sight - visual path between antennas - high frequencies common in metropolitan areas - cover many home simultaneously also options for non line-of-sight- lower frequencies WiMAX networking - worldwide interoperability for microwave access - Wireless high-speed internet access

ATX Motherboard

12in by 9.6in +3.3V +5V +12V -12V outputs 5V standby output 24-Pin power connector ATX motherboards have the most expandability. They typically have six (or fewer) PCIe slots for things like graphics, sound, and network cards. However, there are Extended ATX (or EATX) boards that have seven PCIe slots, but those are aimed at enthusiasts and servers and are beyond the scope of this article.Sep 27, 2019

Port Forwarding

24 x 7 access to a service host it internally - web server, gaming server, security system, Etc. - external IP forward part number maps to an internal IP/port also called destination Nat or static NAT - destination address is translated from a public IP to a private IP - does not expire or timeout

2G network

2G (or 2-G) is short for second-generation cellular network. 2G cellular networks were commercially launched on the GSM standard in Finland by Radiolinja (now part of Elisa Oyj) in 1991.

5G

5G wireless technology is meant to deliver higher multi-Gbps peak data speeds, ultra low latency, more reliability, massive network capacity, increased availability, and a more uniform user experience to more users. Higher performance and improved efficiency empower new user experiences and connects new industries.

RJ11 Connector

6 position, two conductor sp2c - rj14 uses SP for C4 dual-line use telephone connection

possible bandwidth of an 802. 11ac

6,933Mbps The theoretical max speed of 802.11ac is eight 160MHz 256-QAM channels, each of which are capable of 866.7Mbps, for a total of 6,933Mbps, or just shy of 7Gbps. That's a transfer rate of 900 megabytes per second — more than you can squeeze down a SATA 3 link.Aug 22, 2016

the seven layers of the OSI model backwards.

7. application 6. presentation 5. sessions 4. transport 3. Network 2. data link 1. physical

DevOps Engineer

A DevOps engineer introduces processes, tools, and methodologies to balance needs throughout the software development life cycle, from coding and deployment, to maintenance and updates. Development teams and IT operations teams can have different skills and different goals.

IPSec (Internet Protocol Security)

A Layer 3 protocol that defines encryption, authentication, and key management for TCP/IP transmissions. IPSec is an enhancement to IPv4 and is native to IPv6. IPSec is unique among authentication methods in that it adds security information to the header of all IP packets.

10GBASE-T

A Physical layer standard for achieving 10-Gbps data transmission over twisted pair cable. Described in its 2006 standard 802.3an, IEEE specifies Cat 6 or Cat 7 cable as the appropriate medium for 10GBase-T. The maximum segment length for 10GBase-T is 100 meters.

time domain reflectometer

A Time Domain Reflectometer (TDR) is a device used to detect the location of faults in transmission lines and coaxial cables. The TDR sends a low voltage pulsed signal through the transmission line and checks for any reflections seen due to impedance mismatch. If there is no impedance mismatch throughout the line then there will be no reflections, however, if there is a discontinuity in the transmission line at a particular point, some part of the pulsed signal will get reflected back to the TDR. By measuring the time and propagation velocity of the received pulse, the TDR can calculate the exact location of the fault and the nature of the fault ex. open circuit, short circuit or impedance mismatch.

SSL VPN (Secure Socket Layer VPN)

A VPN format that works with a web browser-installing a separate client is not necessary. TCP Port 443 This is the same protocol that we use to communicate securely to web servers inside of our browser. This means we can avoid a lot of problems with firewalls by using this very common and well-used protocol.

SSL VPN secure socket layer VPN

A VPN format that works with a web browser-installing a separate client is not necessary. uses common SSL/TLS protocol TCP 443 - avoids running into most firewall issues no big VPN client - usually remote access communication authenticate users - no requirement for digital certificates or shared passwords like ipsec can be run from a browser or from (usually light) VPN client - across many operating systems

rimm - rambus in-line memory module

A ____ is a memory module used by the RDRAM specifications. debuted in 1999 rdram speed was a 800 megahertz - considerably faster than sdram which speed was that 133 megahertz - only how to to buy wide bus . which compared to sdram has an eight byte wide bus 800 megahertz * 2 bytes equals 1600 megabytes per second

unmanaged switch

A basic Layer 2 switch. This will work simply by plugging it in and connecting it. It is not configurable. very few configuration options - Plug & Play fixed configuration -no VLANs very little integration with other devices - no management protocols low price point - simple is less expensive

cable tester

A cable tester is an electronic device used to verify the electrical connections in a signal cable or other wired assembly. ... More advanced cable testers can measure the signal transmission properties of the cable such as its resistance, signal attenuation, noise and interference.

wireless access point WAP

A central connecting device used in wireless networks. WAP is a bridge - extends the wired Network on to the wireless network - makes forwarding decisions based on Mac address

cipher suites: What is a modern cipher suite?

A cipher suite is a set of algorithms that help secure a network connection that uses Transport Layer Security (TLS) or its now-deprecated predecessor Secure Socket Layer (SSL). ... In addition, cipher suites can include signatures and an authentication algorithm to help authenticate the server and or client.

hot swappable Drive

A drive that can be safely installed and removed while a computer is up and running without damaging the data stored on the drive. (2) add and remove while the system is running - the connection is "hot" Drive chassis - two or more drives easy to repair - replace a drive while the system is running - combine with raid for 100% uptime

proxy server

A form of network security that acts as a go-between for requests on a network. "You might also even find older firewalls that act as a proxy, which means that they sit in the middle of the communication." Professor Messer

Virtual LAN (VLAN)

A group of hosts with a common set of requirements that communicate as if they were connected together in a normal fashion on one switch, regardless of their physical location. a group of devices in the same broadcast domain separated logically instead of physically

USB Universal serial bus

A hardware interface standard designed to provide connections for numerous peripherals. simplify connections - printers, storage devices, keyboard, mouse USB 1.1 - low-speed: 1.5 megabits per second, 3Meters - full speed: 12 megabits per second, 5m USB 2.0 - 480 megabits per second, 5 m USB 3.0 - super speed - 5 gigabit per second, 3meters . standard does not specify a cable length

broadband

A high-speed Internet connection that is always connected different traffic types Transmissions across multiple frequencies.

Hub multi-port repeater

A hub in a 10Base-T Ethernet network is often known as a multiport repeater because it sends every input signal to all output ports.

Ethernet Hub

A hub is one type of networking device that is installed at the Access Layer of an Ethernet network. Hubs contain multiple ports that are used to connect hosts to the network. Hubs are simple devices that do not have the necessary electronics to decode the messages sent between hosts on the network. Hubs cannot determine which host should get any particular message. A hub simply accepts electronic signals from one port and regenerates (or repeats) the same message out all of the other ports

Switches

A layer 2 device that used to connect two or more network segments and regulate traffic. bridging done in Hardware - application-specific integrated-circuit Asic - forward traffic Based on data link address. many ports and features - the core of an Enterprise Network - May provide power over ethernet (PoE) multi-layer switch - includes routing functionality

Routers

A layer 3 device that used to connect two or more network segments and regulate traffic. Route traffic between IP subnets - makes forwarding decisions based on IP address - routers inside of switches sometimes called "layer 3 switches" often connects diverse Network types - Lan, Wan, copper, fiber

Wireless LAN (WLAN)

A local area network that uses a wireless medium - such as radio frequency transmissions - to connect computers, printers, and other devices.

FTP file transfer protocol

A protocol used to move files and folders over a network or the Internet.

serial port

A male 9-pin or 25-pin port on a computer system used by slower I/O devices such as a mouse or modem. Data travels serially, one bit at a time, through the port. Serial ports are sometimes configured as COM1, COM2, COM3, or COM4. In computing, a serial port is a serial communication physical interface through which information transfers, either in or out, one bit at a time (in contrast with parallel port). During most of the personal computers history, serial ports connected computers to devices such as terminals and various peripherals. A socket that connects to a serial interface (one bit following another over one line). Serial ports are widely used by sensors for data acquisition, and they were standard on early computers for connecting a modem, mouse and other peripherals. The serial port is a type of connection on PCs that is used for peripherals such as mice, gaming controllers, modems, and older printers. It is sometimes called a COM port or an RS-232 port, which is its technical name. If that's not enough to confuse you, there are two types of serial ports -- DB9 and DB25.

MAC filtering

A method used to filter out which computers can access the wireless network; the WAP does this by consulting a list of MAC addresses that have been previously entered. media Access Control - the "Hardware" address limit access through the physical Hardware address - keeps the neighbors out - additional Administration with visitors easy to find working Mac addresses through wireless LAN analysis - Mac addresses can be spoofed - free open source software security through obscurity

switch (networking)

A network switch is a device that operates at the Data Link layer of the OSI model—Layer 2. ... They can also operate at the network layer--Layer 3 where routing occurs. Switches are a common component of networks based on ethernet, Fibre Channel, Asynchronous Transfer Mode (ATM), and InfiniBand, among others.

punch down block

A panel of data receptors into which twisted pair wire is inserted, or punched down, to complete a circuit.

plazma display

A plasma display panel is a type of flat panel display that uses small cells containing plasma: ionized gas that responds to electric fields. Plasma TVs were the first flat panel displays to be released to the public. Until about 2007, plasma displays were commonly used in large televisions. Wikipedia

cryptographic capabilities

A product with cryptographic capabilities can be designed to provide data confidentiality, data integrity, and user authentication in any combination; a given commercial cryptographic product may implement functionality for any or all of these capabilities.

802.11

A series of network standards that specifies how two wireless devices communicate over the air with each other. frequency - 2.4 gigahertz or 5 gigahertz - and sometimes both for example the 802. 11n standard channels - groups of frequencies, numbered by the IEEE - non overlapping channels would be necessary bandwidth - amount of frequency in use - 20 megahertz, 40 megahertz, 80 megahertz, 160 megahertz

DHCP Server

A server that manages IP address assignment, maintaining information about which addresses are allowable, which are available, and which have already been associated with a host.

mail server

A server that manages the storage and transfer of e-mail messages. could be logged into using a username and password on the network

file server

A specialized server that enables clients to share applications and data across the network.

RJ45 connector

A square plastic cable connector that resembles an oversized telephone connector, and is used to connect Ethernet devices. 8 position, 8 conductor 8 p8c - modular connector similar in shape to an rj48c - 8 p 4 C, used with T1/ w a n data lines

dimm dual in-line memory module

A style of 168-, 184-, or 240-pin memory chip normally used for RAM chips on Pentium and higher motherboards. Ram random access memory start on the motherboard in modules that are called dimms dual in-line memory module a dim is called a dual-line memory module because it has two rows of pens one on each side pins: 168 184 240 288 installed on memory slots on the motherboard the average motherboard will have between 2 and 4 memory slots

Local Subnet

A subnet is a number of machines with IP address in the same range and which can talk to each other without going through a router. In the case of a typical system, one might have a network of 192.168. 0.0 - 192.168. 0.254. Any machine in this range can talk to any other machine in that range directly, ie no router.Dec 25, 2014

multi-layer switch

A switch that can make decisions about routing a packet based on packet content. "There are some switches that allow you to have both switching functionality and routing functionality within the same device. We refer to these as multi-layer switches or layer 3 switches."

Buffer Overflow

A technique for crashing by sending too much data to the buffer in a computer's memory

Nat Network address translation

A technique often used to conserve IP addresses by maps devices on a private network to single Internet-connected device that acts on their behalf. it is estimated that there are over 20 billion devices connected to the internet and growing - ipv 4 support surround 4.29 billion addresses the address space or ipv4 is exhausted - there are no available addresses to assign how does it all work - Network address translation this isn't the only use of Nat - Nat is handy in many situations

WAN:

A telecommunications network or computer network that extends over a large geographical distance/place. Wide area networks are often established with leased telecommunication circuits.

punch down tool

A tool used in a wiring closet to connect cable wires directly to a patch panel.

cable crimper

A tool used to attach a connector onto the end of a cable, causing the internal RJ-45 pins to pierce the insulation of the wires, thus creating contact between the conductors at each wire. Crimpers are tools used to make cold weld joints between two wires or a wire and aconnector, such as lugs. ... Crimping tools are sized according to the wire gauges (using AWG - American Wire Gauge) they can accept. Some come with interchangeable die heads that allow for a wider range of wire sizes and connectors. "This cable crimper, for instance, has two different connectors on the end, one that is a six-position, which is for RJ11. And one is an eight-position, which is used for crimping RJ45." Professor Messer The crimper's job is to take the copper that's inside of that modular connector and push it through the insulation of that wire, so that you have copper-to-copper connectivity going from the wire itself into the connector and ultimately into your network device.

Dial-up

A type of network connection in which data is passed through phone lines. network with voice telephone lines - analog lines with limited frequency response 56 kilobits modems - compression up to 320 kilobits per second relatively slow throughput - difficult to scale Legacy system, Network utility - may be difficult to find a modem

Syslog server

A type of server used for collecting system messages from networked devices standard for message logging - diverse systems, Consolidated log usually a central locking receiver - integrated into the Siem you're going to need a lot of disk space - no, more. More than that. Worm Drive technology - write once read many - DVR -R protecting port and security logs

Bluetooth technology

A type of wireless technology that uses radio waves to transmit data over short distances (approximately 3-300 feet depending on power); often used to connect peripherals such as printers and keyboards to computers or headsets to cell phones.

Virtual LAN (VLAN)

A virtual network that is implemented to segment the network, reduce collisions, organize the network, boost performance, and, hopefully, increase security.

802.11n

A wireless network standard that defines speeds of up to 600 Mbps. It is downward-compatible with 802.11a, 802.11b, and 802.11g. (13)

802.11b

A wireless network standard that uses the 2.4 GHz band at a speed of up to 10 Mbps. (13)

IEEE 802.3:

A working group and a collection of IEEE standards produced by the working group defining the physical layer and data link layer's media access control (MAC) of wired Ethernet.

asymmetric digital subscriber line

ADSL--A network access that allows your computer to communicate at approximately one Mbps.

port mapping

AKA port forwarding.

EOP (Ethernet Over Power)

An Ethernet LAN connection implemented over the electrical wiring in a building using a pair of power-line adapters, one at each end of the connection, that plug into power outlets.

ethernet over power EoP

An Ethernet LAN connection implemented over the electrical wiring in a building using a pair of power-line adapters, one at each end of the connection, that plug into power outlets. also called power line communication plc - IEEE standard 1901 500 megabits per second - standard includes links to the premise intra building networking, Vehicles, Smart Energy devices, and more

100BaseTX

An IEEE 802.3 classification that specifies the use of Category 5e cable on pairs 1 and 2 only. It is configured in a star topology and has a data rate of 100 Mbps.

SSL

An abbreviation for Secure Sockets Layer; it is a protocol that provides security when communicating on the Internet

Tone generators and tone locators are used to determine characteristics about a cable.

An electronic device that sends an electrical signal through one set of UTP cables. an electronic device it looks like a box with knobs and a positive in a wire pincher connectors on the end of each wire and the probe is like a a pointy metal end on a piece of electronic instrumentation. This allows you to follow or track where a wire is going from one end to the other by simply following a tone. the probe allows you to place the metal tip near the copper wire and hear audio tones coming through the copper wire I take my inductive probe, which has a button on the front that I hold, and I simply touch the inductive probe to the different cables. You'll notice, you don't hear anything. You don't see anything. But when you finally get to the cable that does have the tone generator on the other end you'll hear the sound. You'll see the light flashing. And you know that this must be the cable that has that tone generator on the other side.

tone generator

An electronic device that sends an electrical signal through one set of UTP cables. where does that wire go? - follow the tone. helps to track from one end of a wire to another simply by sending a tone through it inductive probe - doesn't need to touch the copper - hear through a small speaker

DOCSIS (Data Over Cable Service Interface Specification)

An international, cooperative effort orchestrated by Cable- Labs that standardized broadband cable service.

HP Auto MDI-X:

Automatically detects the required cable connection type and configures the connection appropriately, removing the need for crossover cables to interconnect switches or connecting PCs peer-to-peer.

BNC Connector with RG-58 Cable and Terminator

Bayonet Neill Concelman, BNC The 'Bayonet Neill-Concelman' connector (actual name) but sometimes referred to as "Bayonet Navel Connector", usually referred to as a BNC coaxial (coax) connector. It is commonly used in conjunction with low noise 50-ohm instrumentation lines. Connects to radio frequencies up to 3GHz and voltages under 500VDC. Coaxial ethernet cabling nearly always termintated with BNC (Bayonet Neill Concelman) connectors. Our BNC's are capable of vacuum ranges from 1x10-8 to 1x10-10 Torr and the flanges are rated from -200ºC to up to 250ºC depending on the type of flange silected. Our vacuum cable assemblies are made using a stainless steel Accu-Fast connector with PEEK insulation at one end and our TYP6, 26 AWG, 50-OHM Coaxial Cable with no connector on the other. While our air side cable assemblies us a standard RG174/U coaxial (coax) cable with two BNC connectors on each end of a 49" long cable. The cables mate directly with the air side of BNC feedthrough flanges. Accu-Glass Products' BNC coaxial instrumentation feedthroughs are constructed with either floating shields or grounded shields. A little bit of history: The connector was named the BNC (for Bayonet Neill-Concelman) after its bayonet mount locking mechanism and its inventors, Paul Neill and Carl Concelman. Neill worked at Bell Labs and also invented the N connector; Concelman worked at Amphenol and also invented the C connector. A backronym has been mistakenly applied to it: British Naval Connector. Another common incorrectly attributed origin is Berkeley Nucleonics Corporation. The basis for the development of the BNC connector was largely the work of Octavio M. Salati, a graduate of the Moore School of Electrical Engineering of the University of Pennsylvania. In 1945, while working at Hazeltine Electronics Corporation, he filed a patent for a connector for coaxial cables that would minimize wave reflection/loss. The patent was granted in 1951.

CAT 5 / 6 / 7 /

CABLEK INDUSTRIESSERVICESNEWS - COVID 19TECHNICAL REFERENCE Category 5, 5e, 6, 6a and 7 Cable Standards Category 5 Cable Category 5 (CAT5) cable is a multi-pair (usually 4 pair) high performance cable that consists of twisted pair conductors, used mainly for data transmission. Basic CAT5 cable was designed for characteristics of up to 100 MHz. CAT5 cable is typically used for Ethernet networks running at 10 or 100 Mbps. Category 5e Cable Category 5e (CAT5e) cable, also known as Enhanced Category 5, is designed to support full-duplex Fast Ethernet operation and Gigabit Ethernet. The main differences between CAT5 and CAT5e can be found in the specifications. The performance requirements have been raised slightly in the new standard (see comparison chart below). CAT5e has stricter specifications for Power Sum Equal-Level Far-End Crosstalk (PS-ELFEXT), Near-End Crosstalk (NEXT), Attenuation, and Return Loss (RL) than those for CAT5. Like CAT5, CAT5e is a 100-MHz standard, but it has the capacity to handle bandwidth superior to that of CAT5. CAT5 cable is typically used for Ethernet networks running at 100 Mbps or 1 Gbps. Use Cablek's GigaBase 350 CAT5e, 350-MHz Solid High-Performance, ETL Verified Bulk Cable. Easy way to tell the difference between a Cat5e and Cat6 Patch Cable Category 6 Cable Category 6 (CAT6) cable provides higher performance than CAT5e and features more stringent specifications for crosstalk and system noise. The quality of the data transmission depends upon the performance of the components of the channel. To transmit according to CAT6 specifications, jacks, patch cables, patch panels, cross-connects, and cabling must all meet CAT6 standards. The CAT6 components are tested individually, and they are also tested together for performance. In addition, the standard calls for generic system performance so that CAT6 components from any vendor can be used in the channel. All CAT6 components must be backward compatible with CAT5e, CAT5, and CAT3. If different category components are used with CAT6 components, then the channel will achieve the transmission performance of the lower category. For instance, if CAT6 cable is used with CAT5e jacks, the channel will perform at a CAT5e level. Use Cablek's Category 6+ DATAGAIN Solid High-Performance, ETL Verified Bulk Cable. Augmented Category 6 (CAT6a) Cable CAT6a is a 10-Gigabit Ethernet over copper proposal to the CAT6 standard. The IEEE published a draft standard (Std 802.3an) in October 2004. The draft calls for 10-Gigabit data transmission over a 4-pair twisted-pair copper cable for a distance of 100 meters on Class F or Class E-augmented copper cabling. The draft extends CAT6 electrical specifications from 250 MHz to 500 MHz. It also proposes a new measurement: Power-Sum Alien Crosstalk to 500 MHz. Alien Crosstalk is a coupled signal in a disturbed pair arising from a signal in a neighboring cable. The TIA is working to complete a new specification that will define enhanced performance standards for unshielded twisted pair cable systems. Draft specification ANSI/TIA/EIA-568-B.2-10 specifies cable systems, called "Augmented Category 6" or more frequently as "Category 6a", that operate at frequencies up to 500 MHz and will provide up to 10 Gbit/s bandwidth. The new specification has limits on alien crosstalk in cabling systems. Augmented Category 6 specifies cable operating at minimum frequency of 500 MHz, for both shielded and unshielded. It can support future 10 Gb/s applications up to the maximum distance of 100 meters on a 4-connector channel. Within the networking market place the move towards the ratification of Category 6 Augmented cabling is continuing, but with no firm standards set, it is a time to wait and see. Although a number of companies have announced Cat6A products, it is clear that these are purely based on proprietary systems, with a great deal of hope thrown in. The basic drive behind Cat6A is the desire to support 10Gbps to the desk over the standard 100m. Although the current Cat6 standard will support it up to 55m, this is not suitable for most organisations. Category 7/Class F Category 7/Class F (ISO/IEC 11801:2002) specifies a frequency range of 1-600 MHz over 100 meters of fully shielded twisted-pair cabling. It encompasses four individually shielded pairs inside an overall shield, called Shielded/Foiled Twisted Pair (S/FTP) or Foiled/ Foiled Twisted Pair (F/FTP). There is a pending class Fa, based on the use of S/FTP cable to 1000 MHz. It can support 10GBASE-T transmissions. With both types of cable, each twisted pair is enclosed in foil. In S/FTP cable, all four pairs are encased in an overall metal braid. In F/FTP, the four pairs are encased in foil. Category 7/Class F cable can be terminated with two interface designs as specified in IEC 6063-7-7 and IEC 61076-3-104. One is an RJ-45 compatible GG-45 connector. The other is the more common TERA connector, which was launched in 1999. Category 7/Class F is backwards compatible with traditional CAT6 and CAT5 cable, but it has far more stringent specifications for crosstalk and system noise. The fully shielded cable virtually eliminates crosstalk between the pairs. In addition, the cable is noise resistant, which makes the Category 7/Class F systems ideal for high EMI areas, such as industrial and medical imaging facilities. Category 7/Class F cable can also increase security by preventing the emission of data signals from the cable to nearby areas. CAT5 CAT5e CAT6 CAT6a CAT7 (Proposed) Networks Supported 100BASE-T 1000BASE-T 1000BASE-TX 10GBASE

CSMA/CD

Carrier Sense Multiple Access/Collision Detection

Network interface controller

Circuitry, often on an expansion card mounted inside a computer, that transmits and receives data on a local area network. Also called a NIC, network card, or network adapter.

tensor Processing Unit TCU

Cloud Tensor Processing Units (TPUs) | Google Cloud Tensor Processing Units (TPUs) are Google's custom-developed application-specific integrated circuits (ASICs) used to accelerate machine learning workloads. TPUs are designed from the ground up with the benefit of Google's deep experience and leadership in machine learning. Tensor Processing Unit is an AI accelerator application-specific integrated circuit developed by Google specifically for neural network machine learning, particularly using Google's own TensorFlow software. Wikipedia

CDMA

Code Division Multiple Access What is the CDMA network? CDMA stands for "Code Division Multiple Access." GSM stands for "Global System for Mobiles." They are 2 radio networks used by wireless carriers. If the GSM/CDMA divide has popped up on your radar, it's likely because you tried to transfer a phone from one carrier's service to another and encountered roadblocks.

Half Duplex

Communication between two devices whereby transmission takes place in only one direction at a time.

It won't fit ram isn't backward or forward compatible.

DDR ddr2 DDR3 ddr4 so DIMM DDR so DIMM ddr 2 so DIMM ddr 3 no generations of memory module have backwards compatibility they all have different slots in different places on the memory chips

RAM

DDR 333 PC 2700 DDR may include both the clock speed and the total bandwidth and its name. DDR may include both the clock speed and the total bandwidth in its name 333 megahertz * 8 bytes equals 2700 MB megabytes per second

cable testers

Devices used to identify problems with cables or to confirm their functionality. relatively simple - continuity test can identify missing pins - or crossed wires not usually used for frequency testing - crosstalk, signal loss, Etc time domain reflectometer

adapters and converters

Devices which can adapt one type of display type to another or convert one power supply type to another, such as a DVI to HDMI adapter or USB A to USB B converter. Other examples include USB to Ethernet, DVI to VGA, Thunderbolt to DVI, PS/2 to USB, and HDMI to VGA. the best laid plans - need an adapter convert between different connectors - electrically compatible converted from one form at to another - you need ethernet but you only have USB a good temporary fix - or a good permanent one

DCP

Digital Cinema Package The word DCP is an acronym that stands for "Digital Cinema Package." That might sound a bit confusing. The words Digital Cinema are easy enough, but what about the term package? Many filmmakers, even those familiar with DCPs might not have ever actually seen one.

sata

Interface for connecting storage devices like hard disks. -power 15 pins -Data 7pins moles power connection

End-to-end encryption

End-to-end encryption (E2EE) is a system of communication where only the communicating users can read the messages. In principle, it prevents potential eavesdroppers - including telecom providers, Internet providers, and even the provider of the communication service - from being able to access the cryptographic keys needed to decrypt the conversation.[1] In many messaging systems, including email and many chat networks, messages pass through intermediaries and are stored by a third party,[2] from which they are retrieved by the recipient. Even if the messages are encrypted, they are only encrypted 'in transit', and are thus accessible by the service provider,[3] regardless of whether server-side disk encryption is used. Server-side disk encryption simply prevents unauthorized users from viewing this information, it does not prevent the company itself from viewing the information, as they have the key and can simply decrypt this data. This allows the third party to provide search and other features, or to scan for illegal and unacceptable content, but also means they can be read and misused by anyone who has access to the stored messages on the third party system, whether this is by design or via a backdoor. This can be seen as a concern in many cases where privacy is very important, such as businesses whose reputation depends on their ability to protect third party data, negotiations and communications that are important enough to have a risk of targeted 'hacking' or surveillance, and where sensitive subjects such as health, and information about minors are involved[further explanation needed]. End-to-end encryption is intended to prevent data being read or secretly modified, other than by the true sender and recipient(s). The messages are encrypted by the sender but the third party does not have a means to decrypt them, and stores them encrypted. The recipients retrieve the encrypted data and decrypts it themselves. Because no third parties can decipher the data being communicated or stored, for example, companies that use end-to-end encryption are unable to hand over texts of their customers' messages to the authorities.[4

RAID 0 (striping)

File blocks are split between two or more physical drives High performance and data written quickly No redundancy A drive failure breaks the array RAID 0 is 0 redundancy disk0 - block 1A - block 3A - block 5A - block 7A disk1 - block 2A - block 4A - block 6A - block 8A

HDMI high-definition multimedia interface

HDMI transfers uncompressed digital data. Typically, it is used for connecting high definition video and audio devices. video and audio stream - All Digital, no analog - 20 meter distance before losing too much signal. 19 pin type A connector -proprietary connector mini HDMI - type c connector - design for smaller devices usually the HDMI port is in the video card so therefore would have a lot of other types of video ports like DVI or DisplayPort around it

Wi-Fi analyzer

Hardware and/or software that monitors a Wi-Fi network to detect devices not authorized to use the network, identify attempts to hack transmissions, or detect performance and security vulnerabilities. wireless networks are incredibly easy to monitor - everyone "hears" everything purpose-built Hardware or mobile device add-on - specializes in 802. 11 analysis identify errors and interference - validate antenna location and installation

how fast is 10 megabits per second

How Fast is 10 Megabits Per Second? It is a hard question to answer, because every people uses internet in their own way. If you just surf the web, read and write blogs, check your e-mails, stream standard definition contents and download small files, then yes, 10Mbps internet would be fine for you. But 10Mbps won't be enough for business usage. And it would be slow for two or more users at home. Especially, if you like to stream HD videos, play online games and download large files, you will need faster internet speed. 10 Megabits internet speed allows you to download 1.25 Megabyte per second. That means 1.250 KB and 0.00125 GB per second. If you choose an internet package with 10Mbps, then you can download a 1GB file within 14 minutes or so. You can use our tool to convert megabits per sec (Mbps) to megabytes per sec (MB/s). 10 Mbps = 1.25 MB/s 16 Mbps = 2 MB/s 24 Mbps = 3 MB/s 35 Mbps = 4.375 MB/s 50 Mbps = 6.25 MB/s 100 Mbps = 12.5 MB/s

IPS panel

IPS technology reproduces colors more accurately and does not suffer from the shifts in color when the screen is viewed from wide angles. These characteristics makes IPS ideal for those who require a true‐to‐life representation of the original colors of the image displayed. For that reason, as well as for their lack of reaction to being touched, IPS panels are more suitable for touchscreens, including those on handheld portable devices, such as smartphones. The drawbacks of slow response and lusterless display of black hues have been mitigated through the generations of IPS technological advancements. Nevertheless, IPS remains a more expensive solution that requires more power to operate than TN.

Interface

In computing, an interface is a shared boundary across which two or more separate components of a computer system exchange information. The exchange can be between software, computer hardware, peripheral devices, humans, and combinations of these. A network interface is the point of interconnection between a computer and a private or public network. A network interface is generally a network interface card (NIC), but does not have to have a physical form. Instead, the network interface can be implemented in software. For example, the loopback interface How do I find my network interface? Follow these steps to check on the NIC hardware: Open the Control Panel. Open the Device Manager. ... Expand the Network Adapters item to view all network adapters installed on your PC. ... Double-click the Network Adapter entry to display your PC's network adapter's Properties dialog box.

bandwidth [speed-kbps]

Interface subcommand that sets the router's opinion of the link speed, in kbps, but has no effect on the actual speed.

ISDN

Integrated Services Digital Network Bri - basic rate interface (2B+D) - 264 kilobits per second Bearer B channels - one 16 kilobits per second signaling D Channel PRI-- primary rate interface - delivered over T1 or E1 -T1-23B+D -E1-30B+D alarm Channel - commonly used as connectivity from the pstn to large phone systems PBX

Internet Gateway Device Protocol

Internet Gateway Device (IGD) Standardized Device Control Protocol[1] is a protocol for mapping ports in network address translation (NAT) setups, supported by some NAT-enabled routers.[2] It is a common communications protocol for automatically configuring port forwarding, and is part of an ISO/IEC Standard [3] rather than an Internet Engineering Task Force standard.

IMAP

Internet Message Access Protocol TCP Port 143

IoT

Internet of Things

iot configurations

Internet of Things - home automation, mostly Wireless - security is an issue devices - thermostat - light switches - security cameras - door locks - voice enabled smart speakers/ digital assistants. almost all devices communicate outbound - no special Port mapping/Nat configurations required.

Layer 2 Devices and Their Functions

Layer 2 defines how data is formatted for transmission and how access to the physical media is controlled. These devices also provide an interface between the Layer 2 device and the physical media. Some common examples are a NIC installed in a host, bridge, or switch.

LDAP

Lightweight Directory Access Protocol uses TCP port 389

lcd

Liquid Crystal Display

single mode fiber

Long-range communication, - over 80 km without additional processing expensive light source - laser beams

ITX Motherboard

MINI ITX: 6.7in by 6.7in Good for HTPC's. NANO ITX: 4.7in by 4.7in Used in media centers, automotive PC's, personal recorders PICO ITX: 3.9in by 2.8in Used in extremely small PC's and ultra mobile. MOBILE ITX: 60mm by 60mm No ports, requires secondary I/O board Used for smart-phones and tiny devices. Mini-ITX is a compact motherboard configuration designed to support relatively low-cost computers in small spaces such as in automobiles, set-top box es, and network devices. ... A case (a Micro-ATX and Flex-ATX case will work), memory, a hard drive, and a power supply complete an inexpensive computer.

MII:

Media Independent Interface. The interface (both physical and electrical/optical) in a computer network from a physical layer implementation to the physical medium used to carry the transmission.

MDI-X:

Medium Dependent Interface Crossover. A variant of Ethernet over twisted pair technology that uses a female 8P8C port connection on a computer or other network device to connect pins 1 and 2 (transmit) on an MDI device to pins 1 and 2 (receive) on an MDI-X device.

MDI:

Medium Dependent Interface. The interface (both physical and electrical/optical) in a computer network from a physical layer implementation to the physical medium used to carry the transmission.

ddr4

Memory that is faster and uses less power than DDR3. ddr4 - has 288 pins - offers a higher range of speed than DDR3

Multimode Fiber (MMF)

Multimode fiber-optic cabling has a core with a diameter large enough to permit the injection of light into the core at multiple angles. The different paths (that is, modes) that light travels can lead to multimode delay distortion, which causes bits to be received out of order because the pulses of light representing the bits traveled different paths (and therefore, different distances). short-range communication - 2 km for 100 megabits per second - 550m for 10 GB per second inexpensive light source - IE, LED

NFC

Near field communication; a short-range, wireless communication standard. NFC is being used to support contactless payment and transactions over NFC-equipped mobile devices.

NAT

Network address translation. technology that allows over 20 billion devices to communicate on a network that actually only allows for about 4 billion.

Network Interface Card, or a NIC.

Network interface card, short as NIC, is an important hardware component used to provide network connections. With its wide applications, there are various types of network interface cards emerging in the market like PCIe card and server network card.

INTERNET DOD4 chart

Network layer 3

default gateway/default router

On an IP host, the IP address of some router to which the host sends packets when the packet's destination address is on a subnet other than the local subnet.

Gigabyte (GB)

One gigabyte (GB) is about 1 billion bytes, or 1 thousand megabytes. A computer might have 4 GB of RAM. A flash memory card used in a camera might store 16 GB. A DVD movie is roughly 4-8 GB.

Gigahertz (GHz)

One thousand MHz, or one billion cycles per second.

transport layer 4 TCP ( filtering packets) Central device protocols

PCP, UDP, SPX

filtering packet

Packet filtering is a network security mechanism that works by controlling what data can flow to and from a network.

t568a and t568b termination

Pin assignment from EIE/TIA-568-B standard -8 conductor 100 ohm balanced twisted-pair cabling T568A and T568B are different pin assignments for 8P8C connectors. Many organizations traditionally use 568B -Difficult to change mid stream You can't terminate one side with the other type connector t568a and t568b are different pen assignments for 8P8C connectors - assigns the t568a pin-out to horizontal cabling many organizations traditionally use 568b - difficult to change in midstream you can't terminate one side of the cable with 568a and the other with 568b - you'll run into problems.

PCP

Port Control Protocol (PCP) is a computer networking protocol that allows hosts on IPv4 or IPv6 networks to control how the incoming IPv4 or IPv6 packets are translated and forwarded by an upstream router that performs network address translation (NAT) or packet filtering.

PRI

Primary Rate Interface

printing process

Printing processEdit Learn more This section needs additional citations for verification. Main article: Xerography Diagram of a laser printer The sound of a laser printer A laser beam (typically, an aluminium gallium arsenide (AlGaAs) semiconductor laser that can emit red or infrared light) projects an image of the page to be printed onto an electrically charged, selenium-coated, rotating, cylindrical drum[16] (or, more commonly in subsequent versions, a drum called an organic photoconductor made of N-vinylcarbazole, an organic monomer). Photoconductivity allows the charged electrons to fall away from the areas exposed to light. Powdered ink (toner) particles are then electrostatically attracted to the charged areas of the drum that have not been laser-beamed. The drum then transfers the image onto paper (which is passed through the machine) by direct contact. Finally, the paper is passed onto a finisher, which uses heat to instantly fuse the toner that represents the image onto the paper. There are typically seven steps involved in the process: Raster image processingEdit The document to be printed is encoded in a page description language such as PostScript, Printer Command Language (PCL), or Open XML Paper Specification (OpenXPS). The raster image processor (RIP) converts the page description into a bitmap which is stored in the printer's raster memory. Each horizontal strip of dots across the page is known as a raster line or scan line. Laser printing differs from other printing technologies in that each page is always rendered in a single continuous process without any pausing in the middle, while other technologies like inkjet can pause every few lines.[17] To avoid a buffer underrun (where the laser reaches a point on the page before it has the dots to draw there), a laser printer typically needs enough raster memory to hold the bitmap image of an entire page. Memory requirements increase with the square of the dots per inch, so 600 dpi requires a minimum of 4 megabytes for monochrome, and 16 megabytes for color (still at 600 dpi). For fully graphical output using a page description language, a minimum of 1 megabyte of memory is needed to store an entire monochrome letter/A4 sized page of dots at 300 dpi. At 300 dpi, there are 90,000 dots per square inch (300 dots per linear inch). A typical 8.5 × 11 sheet of paper has 0.25-inch (6.4 mm) margins, reducing the printable area to 8.0 by 10.5 inches (200 mm × 270 mm), or 84 square inches. 84 sq/in × 90,000 dots per sq/in = 7,560,000 dots. 1 megabyte = 1,048,576 bytes, or 8,388,608 bits, which is just large enough to hold the entire page at 300 dpi, leaving about 100 kilobytes to spare for use by the raster image processor. In a color printer, each of the four CMYK toner layers is stored as a separate bitmap, and all four layers are typically preprocessed before printing begins, so a minimum of 4 megabytes is needed for a full-color letter-size page at 300 dpi. During the 1980s, memory chips were still very expensive, which is why entry-level laser printers in that era always came with four-digit suggested retail prices in US dollars. Memory prices later plunged, while improvements in the performance of personal computers and peripheral cables enabled the development of low-end laser printers which offload rasterization to the sending PC. For such printers, the operating system's print spooler renders the raw bitmap of each page into the PC's system memory at the target resolution, then sends that bitmap directly to the laser (at the expense of slowing down all other programs on the sending PC).[18] Thus, 1200 dpi printers have been widely available in the consumer market since 2008. 2400 dpi electrophotographic printing plate makers, essentially laser printers that print on plastic sheets, are also available. ChargingEdit Applying a negative charge to the photosensitive drum In older printers, a corona wire positioned parallel to the drum or, in more recent printers, a primary charge roller, projects an electrostatic charge onto the photoreceptor (otherwise named the photoconductor unit), a revolving photosensitive drum or belt, which is capable of holding an electrostatic charge on its surface while it is in the dark. An AC bias voltage is applied to the primary charge roller to remove any residual charges left by previous images. The roller will also apply a DC bias on the drum surface to ensure a uniform negative potential. Numerous patents[specify] describe the photosensitive drum coating as a silicon sandwich with a photocharging layer, a charge leakage barrier layer, as well as a surface layer. One version[specify] uses amorphous silicon containing hydrogen as the light receiving layer, Boron nitride as a charge leakage barrier layer, as well as a surface layer of doped silicon, notably silicon with oxygen or nitrogen which at sufficient concentration resembles machining silicon nitride. ExposingEdit Laser light selectively neutralizes the negative charge on the photoreceptive drum, to form an electrostatic image Laser unit from a Dell P1500. The white hexagon is the rotating scanner mirror. A laser printer uses a laser because lasers are able to form highly focused, precise, and intense beams of light, especially over the short distances inside of a printer. The laser is aimed at a rotating polygonal mirror which directs the light beam through a system of lenses and mirrors onto the photoreceptor drum, writing pixels at rates up to sixty-five million times per second.[19] The drum continues to rotate during the sweep, and the angle of sweep is canted very slightly to compensate for this motion. The stream of rasterized data held in the printer's memory rapidly turns the laser on and off as it sweeps. The laser beam neutralizes (or reverses) the charge on the surface of the drum, leaving a static electric negative image on the drum's surface which will repel the negatively charged toner particles. The areas on the drum which were struck by the laser, however, momentarily have no charge, and the toner being pressed against the drum by the toner-coated developer roll in the next step moves from the roll's rubber surface to the charged portions of the surface of the drum.[20][21] Some non-laser printers (LED printers) use an array of light-emitting diodes spanning the width of the page to generate an image, rather than using a laser. "Exposing" is also known as "writing" in some documentation. DevelopingEdit As the drums rotate, toner is continuously applied in a 15-micron-thick layer to the developer roll. The surface of the photoreceptor with the latent image is exposed to the toner-covered developer roll. Toner consists of fine particles of dry plastic powder mixed with carbon black or coloring agents. The toner particles are given a negative charge inside the toner cartridge, and as they emerge onto the developer drum they are electrostatically attracted to the photoreceptor's latent image (the areas on the surface of the drum which had been struck by the laser). Because negative charges repel each other, the negatively charged toner particles will not adhere to the drum where the negative charge (imparted previously by the charge roller) remains. TransferringEdit A sheet of paper is then rolled under the photoreceptor drum, which has been coated with a pattern of toner particles in the exact places where the laser struck it moments before. The toner particles have a very weak attraction to both the drum and the paper, but the bond to the drum is weaker and the particles transfer once again, this time from the drum's surface to the paper's surface. Some machines also use a positively charged "transfer roller" on the backside of the paper to help pull the negatively charged toner from the photoreceptor drum to the paper. FusingEdit Toner is fused onto paper with heat and pressure The paper passes through rollers in the fuser assembly, where temperatures up to 427 °C (801 °F) and pressure are used to permanently bond the toner to the paper. One roller is usually a hollow tube (heat roller) and the other is a rubber backed roller (pressure roller). A radiant heat lamp is suspended in the center of the hollow tube, and its infrared energy uniformly heats the roller from the inside. For proper bonding of the toner, the fuser roller must be uniformly hot. Some printers use a very thin flexible metal foil roller, so there is less thermal mass to be heated and the fuser can more quickly reach operating temperature. If paper moves through the fuser more slowly, there is more roller contact time for the toner to melt, and the fuser can operate at a lower temperature. Smaller, inexpensive laser printers typically print slowly, due to this energy-saving design, compared to large high-speed printers where paper moves more rapidly through a high-temperature fuser with very short contact time. Cleaning and rechargingEdit Magnification of color laser printer output, showing individual toner particles comprising 4 dots of an image with a bluish background As the drum completes a revolution, it is exposed to an electrically neutral soft plastic blade that cleans any remaining toner from the photoreceptor drum and deposits it into a waste reservoir. A charge roller then re-establishes a uniform negative charge on the surface of the now clean drum, readying it to be struck again by the laser. Continuous printingEdit Once the raster image generation is complete, all steps of the printing process can occur one after the other in rapid succession. This permits the use of a very small and compact unit, where the photoreceptor is charged, rotates a few degrees and is scanned, rotates a few more degrees, and is developed, and so forth. The entire process can be completed before the drum completes one revolution. Different printers implement these steps in distinct ways. LED printers use a linear array of light-emitting diodes to "write" the light on the drum. The toner is based on either wax or plastic, so that when the paper passes through the fuser assembly, the particles of toner melt. The paper may or may not be oppositely charged. The fuser can be an infrared oven, a heated pressure roller, or (on some very fast, expensive printers) a xenon flash lamp. The warmup process that a laser printer goes through when power is initially applied to the printer consists mainly of heating the fuser element. MalfunctionsEdit The mechanism inside a laser printer is somewhat delicate and, once damaged, often impossible to repair. The drum, in particular, is a critical component: it must not be left exposed to ambient light for more than a few hours, as light is what causes it to lose its charge and will eventually wear it out. Anything that interferes with the operation of the laser such as a scrap of torn paper may prevent the laser from discharging some portion of the drum, causing those areas to appear as white vertical streaks. If the neutral wiper blade fails to remove residual toner from the drum's surface, that toner may circulate on the drum a second time, causing smears on the printed page with each revolution. If the charge roller becomes damaged or does not have enough power, it may fail to adequately negatively charge the surface of the drum, allowing the drum to pick up excessive toner on the next revolution from the developer roll and causing a repeated but fainter image from the previous revolution to appear down the page. If the toner doctor blade does not ensure that a smooth, even layer of toner is applied to the developer roll, the resulting printout may have white streaks from this in places where the blade has scraped off too much toner. Alternatively, if the blade allows too much toner to remain on the developer roll, the toner particles might come loose as the roll turns, precipitate onto the paper below, and become bonded to the paper during the fusing process. This will result in a general darkening of the printed page in broad vertical stripes with very soft edges. If the fuser roller does not reach a high enough temperature or if the ambient humidity is too high, the toner will not fuse well to the paper and may flake off after printing. If the fuser is too hot, the plastic component of the toner may smear, causing the printed text to look like it is wet or smudged, or may cause the melted toner to soak through the paper to the backside. Different manufacturers claim that their toners are specifically developed for their printers and that other toner formulations may not match the original specifications in terms of either tendency to accept a negative charge, to move to the discharged areas of the photoreceptor drum from the developer roll, to fuse appropriately to the paper, or to come off the drum cleanly in each revolution

QFN:

Quad Flat Pack. A surface mount integrated circuit package with "gull wing" leads extending from each of the four sides.

ram

Random Access Memory a single bit or one bit of data is the smallest bit of data the computer reads eight bits is equal to one bite the computer interprets in ones and zeros if a dam is ready to have a 64-bit data path that means: it has an 8-bit wide data path or bus 64 / 8 equals 8

ram

Random Access Memory in order for a program to run a needs to be loaded into RAM first hard drive to ramm RAM to CPU increasing the ram will make the computer run faster requires constant electrical power to store data

ram

Random Access Memory DDR double data rate - Sims double the amount of data in each clock signal then non DDR this is a similar idea as full duplex vs. half-duplex

ram

Random Access Memory DDR vs non DVR

ram

Random Access Memory ddr2 ddr2 is faster than DDR because it allows for higher bus speeds 184 pins includes a 2 and the label contains a tattoo right after the PC identify

ram

Random Access Memory sometimes there are circumstances where memory data corruption cannot be tolerated financial data emergency medical data government data servers that regard this type of data cannot go down for any reason

database injection

SQL injection is a code injection technique, used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker).

Siem

Security Information and Event Management - logging of security events and information security alerts - real-time information log aggregation and long-term storage - usually includes Advanced reporting data correlation link diverse data types forensic analysis - gather details after an event

SIM

Security Information and event Management device A subscriber identity module or subscriber identification module

SNMP

Simple Network Management Protocol

SNMP

Simple Network Management Protocol and it uses UDP port 161 to query devices, and it can receive alarms or traps from those devices over UDP port 162. There may be three different versions of SNMP that could be running in an environment. Version one was the original that provided a non-encrypted, in the clear method so that a device can communicate to a router and ask how many bytes have gone through a particular interface, and that router can respond back with that value. Version 2 of SNMP still communicated without any encryption, but this client could ask many different questions at the same time and receive a bulk transfer in response. Many organizations these days are using SNMP version 3, which provides message integrity and authentication method. And all of the information that's sent between the client and the remote device is all encrypted. Category: CompTIA A+ 220-1001

Mail Server Aliasing

Simply forwards email messages addressed to an email alias on to another, the specified email address. An email alias may be used to create a simple replacement for a long or difficult-to-remember email address. - usually managed by the ISP or the Enterprise it Department - a complex set of requirements usually one of the most important services - Services 24 by 7 support

USB to Ethernet

Some laptops don't have an Ethernet connection -Convert USB to Ethernet take a look at a picture of a USB to ethernet adapter

can be called: NAT Network address translation

Source Network Address Translation. You might also hear it called PAT, for Port Address Translation.

IP subnet

Subdivisions of a Class A, B, or C network, as configured by a network administrator. Subnets allow a single Class A, B, or C network to be used instead of multiple networks, and still allow for a large number of groups of IP addresses, as is required for efficient IP routing.

SDRAM (Synchronous Dynamic RAM)

Synchronous with the common system clock synchronous Dynamic Ram used today in Ram dimms the difference between RAM and sdram is basically speed operates asynchronously with the system clock d-ram sdram- operate synchronously with the system clock all signals are tied to the system clock for a better controlled timing

ethernet over power

Technology that allows for network signals to be sent via electrical power outlets. Devices must be on the same electrical circuit for Ethernet over Power to work.

tcp 21, control

The File Transfer Protocol provides a framework to transfer information between two networked computers, much like Hypertext Transfer Protocol does through a web browser. FTP, however, operates on two different Transmission Control Protocol ports: 20 and 21. FTP ports 20 and 21 must both be open on the network for successful file transfers.

802.1Q

The IEEE standardized protocol for VLAN trunking. IEEE 802.1Q, often referred to as Dot1q, is the networking standard that supports virtual LANs on an IEEE 802.3 Ethernet network. The standard defines a system of VLAN tagging for Ethernet frames and the accompanying procedures to be used by bridges and switches in handling such frames

Transfer Corona Assembly

The part of an EP process printer that is responsible for transferring the developed image from the EP drum to the paper. As the paper feeds into the printer, the transfer corona applies a +600v (positive) charge to the paper. When the paper passes by the drum, the -100v charged toner on the drum jumps off onto the positively charged paper.

Topology

The physical and logical design of a computer network; examples include mesh, bus, ring and star; the physical layout of the network devices and the cabling, and how all the components communicate with each other

PHY:

The physical layer of the OSI model and refers to the circuitry required to implement physical layer functions. A PHY connects to link layer device (often called MAC) to a physical medium such as an optical fiber or copper cable. A PHY device typically includes both Physical Coding Sublayer (PCS) and Physical Medium Dependent (PMD) layer functionality.

4G technology

To put it simply, 4G is defined as the fourth generation of mobile technology which follows the 2G and 3G networks that came before it. It is also sometimes referred to as 4G LTE, but this is not technically correct as LTE is only a single type of 4G. It is currently the most advanced technology that's adopted by the majority of mobile network service providers.

cable crimpers

Tools used for attaching an RJ-45 connector to the end of a twisted-pair Ethernet cable. "pinch" the connector on to a wire - coaxial, twisted pair, fiber the crimper has two different positions one for rj11 and the other one is for pinching RJ45 connect the modular connector to the ethernet cable - the final step of the process metal prongs are pushed through the insulation - the plug is also permanently pressed onto the cable sheath

raid 1 - mirroring

Two drives are used in unison, and all data is written to both drives, giving you a mirror or extra copy of the data, in the case that one drive fails disk0 - block 1 - block 2 - block 3 - block 4 disk1 - block 1 - block 2 - block 3 - block 4 bio blogs are duplicated between two or more physical drives High disk utilization - every file is duplicated - required disc space is doubled High redundancy - drive failure does not affect data availability

USB 3.0 connectors

USB 3.0 standard B plug USB 3.0 standard a plug USB 3.0 micro-b plug

punch down tools

Use for installation of UTP cable into wall jack "punch" a wire into a wiring block - 66 block - 110 block can be tedious - every wire must be individually punched trims the wires during the punch - very efficient process

udp

User Datagram Protocol

UDP

User Datagram Protocol (UDP) - a communications protocol that facilitates the exchange of messages between computing devices in a network. It's an alternative to the transmission control protocol (TCP).

DisplayPort

VESA standard -Video Electronics Standards Association -Royalty free standard Data is sent in a packetized form, -like Ethernet and PCI Express Compatible with HDMI and DVI -Passive adapter available

802. 11n

Which IEEE standard operates at wireless frequencies in both the 5GHz and 2.4GHz ranges? the update to 802. 11g, 802. 11b, and 802. 11a. - October 2009 operates at 5 gigahertz and forwards or 2.4 gigahertz -40 megahertz Channel width 600 megabits per second Mbit/s - 40 megahertz mode and 4 antennas 802. 11n uses MIMO - multiple-input multiple-output - multiple transmit and receive antennas 150 mbit/S 6.8 gigabits per second 600 Mbit/s 4 MIMO lines

WPA encryption

WiFi protected access strong authentication and data encryption replaced WEP

WAN

Wide Area Network, This is connecting one Local Area Network at one location to another Local Area Network that is somewhere very far away, geographically speaking.

WMN

Wireless mesh network One relatively new type of networking, especially networking in our home, is a WMN, or a Wireless Mesh Network. These are usually associated with the Internet of Things. You can think of having all of these different devices inside of your home, being able to create an entire cloud of devices communicating and hopping between each other to complete the entire network.

802.11g

Wireless networking standard that operates in the 2.4-GHz band with a theoretical maximum throughput of 54 Mbps and is backward compatible with 802.11b.

802.11a

Wireless networking standard that operates in the 5-GHz band with a theoretical maximum throughput of 54 Mbps.

DIMM

[Dual In-line Memory Module] a small circuit board, capable of holding several memory chips, that has a 64-bit data path and can be easily connected to a PC's system board. (contrast with SIMM) DIMM - dual in-line memory module - electrical contacts are different on each side 64-bit data width

look at some modular connections Crampton on cramped

a good crimp: look at a picture

LTE

a network standard that defines how high-speed cellular transmissions use broadcast radio to transmit data for mobile communications long term evolution

Wire snips

are used to cleanly cut the cable. Wire cutters are commonly used to cut copper, brass, iron, aluminum, and steel wire. Some wire cutters have insulated handles which ensure that you will not get shocked from the wires you're working with. Diagonal cutters have intersecting jaws that cut the wire at an angle, leaving a flat tip.

dynamic

characterized by constant change, activity, or progress

The printing process basically includes six fundamental processes:

charging, exposure, developing, transferring, cleaning, and fusing.

Patch panels allow you to connect only one kind of cabling; that is, they support only UTP, STP, or fiber, but not a mixture of different types.

combination of punch down block and RJ45 connectors runs from deaths are made ones - permanently punch down to patch panel patch panel to switch can be easily changed - no special tools - use existing cables

aggregated

combined, overall

layer 1: physical

concerned with the transmission and reception of the unstructured Raw bitstream over the physical medium. In the seven-layer OSI model of computer networking, the physical layer or layer 1 is the first and lowest layer. This layer may be implemented by a PHY chip. The physical layer defines the means of transmitting raw bits over a physical data link connecting network nodes. Wikipedia

Metadata

data that describes other data Some examples of basic metadata are author, date created, date modified, and file size. Metadata is also used for unstructured data such as images, video, web pages, spreadsheets, etc. Web pages often include metadata in the form of meta tags. ... Metadata can be created manually or through automation.

Dynamic web page

displays customized content in response to keyboard or mouse actions, or based on information supplied directly or indirectly by the person viewing the page a dynamic web page is a web page that displays different content anytime as viewed for example the page may change with the time of day, the user that accesses the web page, or the type of user interaction. There are two types of dynamic web pages

dns

domain name system server But something needed to translate between the name of my site and the IP address that could then be used to communicate across the internet. That conversion process occurs on a DNS server, a Domain Name System server.

network cabling standards

electronic Industries Alliance EIA - Alliance of trade associations, develop standards for the industry : standard start with RS - #recommended standard or eia number HTTP://www.eia.org telecommunications industry Association Tia - standard, market analysis, trade shows, government Affairs, e t c. . a n s i/ t i a/ t i a - 568 - commercial building telecommunications cabling standard. -://www.tiaonline.org International ISO/IEC 11801 cabling standards - Define classes of networking standards

access point settings

enable/disable frequencies - 2.4 gigahertz and forwards or 5 gigahertz available options will depend on the wireless standard used configure an SSID - may need a separate SSID for each frequency. security mode - WPA2, preferably - pre-shared key or Enterprise channel / Channel bandwidth - automatic/other nearby Networks

IPP

internet printing protocol

Spanning Tree Protocol.

is designed to prevent routing loops from occurring STP.

presentation layer six syntax. Central device/ protocols.

jpeg/ASCII/EBDIC/TIFF/GIF/PICT

d r a m - Dynamic Ram

memory that contains capacitors capacitors hold bits of information like ones or zeros cuz that's how computers process information by ones or zeros capacitors have to be refreshed with electricity constantly this is where the name Dynamic comes from the capacitors have to be dynamically refreshed often

Ram random access memory slots

memory types have changed through the years - driven by standardization and Technology one of the most important components of your computer - speed speed speed every motherboard is different - check your documentation

connector comparison

micro-b plug, USBC plug, and a standard a plug - the micro b and USBC are about the same size

802.11ac introduced:

multi-user MIMO, so you could have eight separate MIMO streams going to multiple devices on the network, all at the same time.

mimo

multiple input multiple output

what layer of the OSI model do routing protocols reside at or run at.

network layer Routing protocols, according to the OSI routing framework, are layer management protocols for the network layer, regardless of their transport mechanism: IS-IS runs on the data link layer (Layer 2)

USB C

newer, reversible connector and port that supports charging, data transfer, and video all in one cable

USB C

newer, reversible connector and port that supports charging, data transfer, and video all in one cable USB has a lot of different connectors - and they have changed over time can be annoying to connect USB a - third time's a charm USBC replaces all of these - one connector to rule them all USBC isn't necessarily USB 3.1 - the cable must support the function . USB 3.1 speeds . power delivery(7.5 Watts) . alternate mode( additional data wires)

asymmetric

not identical on both sides of a dividing central line Because one eyebrow was set markedly higher than the other, William's face had a particularly asymmetric appearance.

SCSI advantages

not just for hard drives scanners, tape drive, CD-ROM drives many devices on a single bus - que onda Guero bus, 16 on wide very intelligent interface functionality - much of the difficult configuration work is done between the SCSI devices industry longevity - well supported in the Enterprise - a standard drive for virtual systems

decimal system

numbers based on ten digits

data redundancy

occurs when unnecessary duplicate information exists in a database

802. 11a

one of the original 802. 11 Wireless standards - October 1999 operates in the 5 gigahertz range - or other frequencies with special licensing 54 megabits per second Mbits/s smaller range than 802. 11b - higher frequency is absorbed by objects in the way - many rules of thumb calculate 1/3 of the range of 802. 11b or 802. 11g not commonly seen today

punchdown best practices

organization is key - lots of wires - cable management maintain your twists - your category 6A cable will thank you later document everything - written documentation - tags - graffiti

the Pata standard

parallel 80 attachment, parallel ATA, ATA - remember the PC/at? in evolutionary process - Circa 1999 originally called integrated Drive Electronics IDE - a Western Digital invention - 2nd generation called EIDE enhanced IDE the evolution - promised faster speeds from 16 megabits per second through 133 megabits per second - additional devices CD-ROM drives Etc now called parallel ATA Pata

PAN

personal area network; Bluetooth

physical structure. cables, hubs, Etc.

physical layer 1 data and coding, physical medium attachment, transmission- technique baseband or broadband, physical medium transmission Nuts and Bolts.

PLC

power line communication

Syntax layer

presentation. layer 6 encrypt decrypt if needed character code translation, data conversion, data compression, data encryption, character set translation.

Zwave

proprietary home automation networking - Internet of Things iot - control lights, logs, garage doors, Etc Wireless Mesh networking - notes can hop through other nodes on the way to the destination uses the i s m BAND - industrial, scientific, and medical - 900 megahertz frequencies in the US - no conflicts with 802. 11

layer 2: data link

provides error-free transfer of data frames from one node to another over the physical layer.

TCP transmission control protocol

provides reliable, ordered, and error-checked delivery of a stream of packets on the internet. TCP is tightly linked with IP and usually seen as TCP/IP in writing.

What is memory?

random access memory RAM is the most common - but it's not the only kind of memory. Ram is not referring to hard drive or SSD storage - don't mix the two terms - data is stored permanently on the drive data and programs can only be used when moved to ram

RS

recommended standard

RS-232

recommended standard 232 - an industry-standard since 1969 db25 de9 serial communication standard - belt for a modem Communications - used for modems printers mice networking commonly used as a configuration port - serial console interface

res 232

recommended standard 232 - an industry-standard since 1969 db25 de9 take a look at those two connectors serial communication standard - Belpre modem communication . used for modems, printers, mice, networking commonly used as a configuration port - serial console interface

reflectometer

re·flec·tom·e·ter /riˌflekˈtämətər/ noun an instrument for measuring quantities associated with reflection, in particular (also time domain reflectometer ) an instrument for locating discontinuities (e.g. faults in electric cables) by detecting and measuring reflected pulses of energy. A time-domain reflectometer is an electronic instrument used to determine the characteristics of electrical lines by observing reflected waveforms. It can be used to characterize and locate faults in metallic cables. Wikipedia

Network layer 3 (filtering packet) Central device protocols: packets

routers IP, IPX, icmp

routing and switching

routing to the outside world -wan/Dsl port. switching local devices 1 VLAN / LAN1, LAN2, LAN3, LAN4, eTC. not much to configure - routes and switches by default

layer 7: Application layer

serves as the window for users and application processes to access the network services.

cinch and send to Port( logical ports)

session layer 5 session establishment, maintenance and termination, session support, perform security, name recognition, logging, Etc.

contiguous

sharing an edge or boundary; touching

ephemeral

short-lived

DVI digital visual interface

single and dual link - single-link; 3.7 gigabit per second HD TV at 60fps - duel links; 7.4 gigabit per second HGTV at 85 FPS DVI-A - analog signals DVI-D - digital signals DVI-I - integrated - digital and analog in the same connector

memory modules

small circuit boards that hold a series of RAM chips and fit into special slots on the motherboard DIMM so DIMM

SCSI Standards

small computer systems interface originally designed to string many peripherals together onto a single Cable/controller - up to 16 devices in a SCSI "chain" many different formats fast SCSI, Ultra SCSI, ultra-wide SCSI, Ultra 2 SCSI, Ultra 3 SCSI, ultra320 SCSI, Ultra 6:40 SCSI, iSCSI, SCSI over IP parallel in serial options

SO - DIMM

small outline dual in-line memory module - about half the width as a DIMM so DIMM ddr so DIMM ddr 2 so DIMM ddr 3 SD RAM used in laptops and mobile devices

virtual reality

the computer-generated simulation of a three-dimensional image or environment that can be interacted with in a seemingly real or physical way by a person using special electronic equipment, such as a helmet with a screen inside or gloves fitted with sensors. when it is used to place the user into an entirely computer-generated environment, it is VR.

double data rate 3 DDR3 sdram

twice the data rate of ddr2 - larger chip capacities - maximum 16 gigabit per DIMM no backwards compatibility - speed brings sacrifice

5G

update to 4G Networks - roll out in late 2018 and 2019 - worldwide launches in 2020 significant performance improvements - at higher frequencies - may not be a significant at lower frequencies technology updates - additional frequencies - improve data transmission methods

Nic configuration

wired - may not have many options - ports configured for auto speed and duplex - speed: 10/100 / 1000 - duplex: half/full Wireless - enable/disabled - SSID - password

Voice over IP communication

voip

ephemeral

lasting a very short time

802. 11 Channel bandwidth

802. 11n a / 20 megahertz 802. 11b 22 megahertz 802. 11 G / 20 megahertz 802. 11n - 20 megahertz or 40 megahertz to contiguous 20 megahertz bonded channels - in 2.4 gigahertz, a 40 megahertz Channel uses much of the available bandwidth 802. 11ac - 40 megahertz for 802. 11n stations - 80 megahertz required for 802.11ac stations - 160 megahertz optional contiguous channels or non-contiguous bonded the 802. 11n standard can be used on the 802. 11ac Network

BNC connector

A connector used with thin coaxial cable. Some BNC connectors are T-shaped bayonet Neill concelman call Neil Bell labs in Carl conselman amphenol coaxial cable connector - DS3 wan links rigid and bulky - can be difficult to work with

1000BaseT

A Gigabit Ethernet standard using CAT 5e/6 UTP cabling, with a 100-m maximum cable distance.

BNC connector

A coaxial cable connector type that uses a twist-and-lock (or bayonet) style of coupling. It may be used with several coaxial cable types, including RG-6 and RG-59. bayonet Neill concelman - Paul Neal Bell labs and Carl conselman amphenol take a look at the BNC connector it's thinner and has a different type of a screw-on coaxial connector type connector with clip-on things twist to lock coaxial cable connector - DS3 Wan links rigid and bulky - can be difficult to work with

10 Base T

An 802.3 standard, created by IEEE for Ethernet, or CSMA/CD local area networks, that incorporates 10-Mbps digital, signaling for transmitting data over twisted pair for a maximum segment length of 100 meters.

CCFL LCD

CCFL backlights are the most common backlight technology and are used in displays ranging from 5.7 to 23 in. or more diagonal. They can have from one to 24 or more lamps mounted along the edge of the LCD or spaced uniformly over the entire back of the display.

authentication server

Computer that checks usernames and passwords when a user tries to log in. It's a centralized repository of all of the authentication credentials for your organization. We don't usually see an authentication server on a home network. And that's usually because it's a small group of people, and you can manage your usernames and passwords individually.

DVI to HDMI

DVI and HDMI are electrically compatible - HDMI is Backward Compatible with dvi-d -No signal conversion required -No loss of video quality - dvi-d take a look at a picture - HDMI take a look at a picture HDMI mini

cross-talk analysis

How do I test crosstalk? Crosstalk analysis can be performed on a total of four signals. Crosstalk analysis analyzes the input signals, removes inter-symbol interference (ISI), finds the crosstalk effects, and shows you the victim signal with the crosstalk removed. What is crosstalk in communication? Electromagnetic (EM) crosstalk is the interference caused by electromagnetic signals affecting another electronic signal. ... The EM signals causing the interference are known as the aggressors while the EM signal affected by crosstalk is known as the victim.

POP3

Post Office Protocol 3 TCP Port 110

ram

Random Access Memory the term 62 or 32 bit datapath refers to the number of bits or data that are transferred in one clock cycle. dimm transfer 64 bits at a time simm transfers 32 bits at a time

routing protocols

Router protocols include: Routing Information Protocol (RIP) Interior Gateway Protocol (IGRP) Open Shortest Path First (OSPF) Exterior Gateway Protocol (EGP) Enhanced Interior Gateway Routing Protocol (EIGRP) Border Gateway Protocol (BGP) Intermediate System-to-Intermediate System

SMII:

Serial Media Independent Interface. A serial bus defined for Ethernet family of 802.3 standards employing a lower pin count for transmission.

surface mount technology

Surface-mount technology (SMT) is a method in which the electrical components are mounted directly onto the surface of a printed circuit board (PCB). An electrical component mounted in this manner is referred to as a surface-mount device (SMD).

All In One Security Appliance

Unified Threat Management (UTM) / Web security gateway URL filter / Content inspection, malware inspection, spam filter, CSU/DSU, router, switch, firewall, IDS/IPS, bandwidth shaper, VPN endpoint Next Generation firewall, - unified threat management UTM web security Gateway URL filter - content inspection malware inspection spam filter CSU DSU firewall router, switch firewall IDS - IPS bandwidth shaper

PoE

Power over Ethernet

ISDN

integrated Services digital Network

data link layer 2 frames land base layer Central device protocols:

switch Bridge WAP PPP/SLIP

UDP protocol

-simplex connectionless P -65,536 ports -"best effort" approach -has low overhead and can transmit data quickly. -should be used only when data is not essential (ex: audio/video streaming)

proxy server

A computer system (or an application program) that intercepts internal user requests and then processes that request on behalf of the user. an intermediate server - client makes the request to the proxy - proxy performs the actual request - the proxy provides results back to the useful features - Access Control, cashing, URL filtering, content scanning

Power Supply

A device that provides power to a computer.

Router

A device that transfers data from one network to another in an intelligent way A device that makes forwarding decisions based on a destination IP address is a router. These are usually standalone devices, but sometimes that routing functionality can also be integrated into switches. We usually refer to those as multi-layer switches or layer 3 switches.

HUB

A device that uses its ports to connect devices (computers, printers, etc.) together

layer 3 switches

A device which will utilize the IP address rather than MAC address to perform functions. Performs similar functions as layer 2 switches.

UPnP universal plug and play

A protocol that enables devices to dynamically add themselves to a network without the need for user intervention or configuration allows network devices to automatically configure and find other network devices - zero configuration applications on the internal Network can open inbound ports using UPnP - no approval needed - used for many peer-to-peer P2P applications best practice would be to disable UPnP - only a table if the application requires it - and maybe not even then

protocol

A set of rules governing the exchange or transmission of data between devices.

Nat Network address translation

A technique often used to conserve IP addresses by maps devices on a private network to single Internet-connected device that acts on their behalf. it is estimated that there are over 20 billion devices connected to the internet and growing - ipv4 support surround 4.29 billion addresses the address space for ipv4 is exhausted - there are no available addresses to assign how does it all work? - Network address translation this isn't the only use of NAT - Nat is handy in many situations

Thin-film-transistor liquid-crystal display

A thin-film-transistor liquid-crystal display (TFT LCD) is a variant of a liquid-crystal ... TN displays benefit from fast pixel response times and less smearing than other LCD display ...

wire stripper

A tool used when terminating a cable. The tool cuts away the plastic jacket or coating around the wires in a cable so that a connector can be installed on the end of the cable.

Bluetooth technology

A type of wireless technology that uses radio waves to transmit data over short distances (approximately 3-300 feet depending on power); often used to connect peripherals such as printers and keyboards to computers or headsets to cell phones. high-speed communication over short distances - pan personal area network connects our mobile devices - smartphones - tethering and file transfers - headsets and headphones - Health monitors - automobile and phone integration - smart watches - external speakers

AES

Advanced Encryption Standard

client to site VPN

Also known as a remote-access VPN, a client-to-site VPN interconnects a remote user with a site, as an alternative to dial-up or ISDN connectivity, at a reduced cost. also called "Remote Access VPN" required software on the user device - maybe belt into existing operating system

BOOTP (Bootstrap Protocol)

An Application layer protocol in the TCP/IP suite that uses a central list of IP addresses and their associated devices' MAC addresses to assign IP addresses to clients dynamically. It was the precursor to DHCP.

wireless access point

An access point is a device that creates a wireless local area network, or WLAN, usually in an office or large building. An access point connects to a wired router, switch, or hub via an Ethernet cable, and projects a Wi-Fi signal to a designated area. For example, if you want to enable Wi-Fi access in your company's reception area but don't have a router within range, you can install an access point near the front desk and run an Ethernet cable through the ceiling back to the server room.

DHCP Server

Assigns an IP address to a computer when it first attempts to initiate a connection to the network Dynamic host configuration protocol - automatic IP address configuration very common service - available on most home routers Enterprise DHCP will be redundant - usually running on Central servers

backwards compatible

Backward compatibility is a property of a system, product, or technology that allows for interoperability with an older legacy system, or with input designed for such a system, especially in telecommunications and computing. Backward compatibility is sometimes also called downward compatibility.

twisted pair copper cabling

Balanced pair operation -Two wires with equal and opposite signals -Transmit+, Transmit-/Receive+, Receive- The twist is key -Keeps a single wire constantly moving away from interference Opposite ends are compared to each other Pairs in the same cable have different twist rates.

print server

Computer on a network that receives and processes print requests.

Molex connector

Computer power connector used by optical drives, hard drives, and case fans. Keyed to prevent it from being inserted into a power port improperly. 4 pin peripheral power connector - Molex connector company - a m p mate-n-lok - provides + 12 volts and + 5 volts power for many devices in the computer case - storage devices - optical drive - fans - other peripherals

DVI to VGA

DVI-A includes analog signals Backwards compatible with VGA -Only 640 x 480 resolution supported -May only need an adapter VGA to DVI Digital will need a converter - check your interface specifications check out a picture of an adapter with a 15-pin VGA on one side and a dvi-a on the other

USB 3.1 SuperSpeed+ and USB 3.2

Data rate is 10 Gbps. Max cable length 5m USB 3.1 - release July 2013 - super speed+ - type A and USB C connectors - 10 gigabit Per Second Twice the rate of USB 3.0 USB 3.2 - release September 2017 - new super speed + modes over USB C 10 GB second and 20 GB second

DSL

Digital Subscriber Line. A method of connecting to the Internet via a phone line. A DSL connection uses copper telephone lines but is able to relay data at much higher speeds than modems and does not interfere with telephone use.

DSL

Digital Subscriber Line. A method of connecting to the Internet via a phone line. A DSL connection uses copper telephone lines but is able to relay data at much higher speeds than modems and does not interfere with telephone use. sometimes referred to as "asymmetrical digital subscriber line "

10BaseT

Ethernet LAN designed to run UTP cabling. This runs at 10 megabits per second. The maximum length for the cabling between the NIC and the hub (or switch, repeater, etc.) is 100 meters. It uses baseband signaling. No industry standard spelling exists. - can run for 100m - Category 3 cabling

Ethernet

Ethernet is a standard communication protocol embedded in software and hardware devices. It is used for building a local area network. The local area network is a computer network that interconnects a group of computers and shares the information through cables or wires.

EoP

Ethernet over Power (EoP) is an adapter which allows for an Ethernet connection using an existing electrical wiring in a building.

Wireless standards

IEEE 802.11 is a set of media access control (MAC) and physical layer (PHY) specifications for implementing wireless local area network (WLAN) a, b, g, n, ac, ad - managed by the IEEE land/man standards committee IEEE 802 many updates over time - check with IEEE for the latest the Wi-Fi trademark - Wi-Fi Alliance handles interoperability testing

802.11ac is the current wireless Ethernet standard

IEEE 802.11ac is a wireless networking standard in the 802.11 set of protocols, providing high-throughput wireless local area networks on the 5 GHz band. The standard was developed in the IEEE Standards Association from 2008 through 2013 and published in December 2013. Wikipedia

PPP point-to-point protocol

In computer networking, Point-to-Point Protocol (PPP) is a Data link layer (layer 2) communications protocol between two routers directly without any host or any other networking in between. It can provide connection authentication, transmission encryption, and compression.

Ethernet frame

In computer networking, an Ethernet frame is a data link layer protocol data unit and uses the underlying Ethernet physical layer transport mechanisms. In other words, a data unit on an Ethernet link transports an Ethernet frame as its payload. Wikipedia

Port Forwarding

In computer networking, port forwarding or port mapping is an application of network address translation that redirects a communication request from one address and port number combination to another while the packets are traversing a network gateway, such as a router or firewall. Wikipedia

laser printing

Laser printing is an electrostatic digital printing process. It produces high-quality text and graphics (and moderate-quality photographs) by repeatedly passing a laser beam back and forth over a negatively charged cylinder called a "drum" to define a differentially charged image.[1] The drum then selectively collects electrically charged powdered ink (toner), and transfers the image to paper, which is then heated in order to permanently fuse the text, imagery, or both, to the paper. As with digital photocopiers, laser printers employ a xerographic printing process. Laser printing differs from traditional xerography as implemented in analog photocopiers in that in the latter, the image is formed by reflecting light off an existing document onto the exposed drum. HP LaserJet 4200 series printer, installed atop high-capacity paper feeder Invented at Xerox PARC in the 1970s, laser printers were introduced for the office and then home markets in subsequent years by IBM, Canon, Xerox, Apple, Hewlett-Packard and many others. Over the decades, quality and speed have increased as the price has fallen, and the once cutting-edge printing devices are now ubiquitous.

Network Layer (Layer 3)

Network layer Located at Layer 3 of the Open Systems Interconnection (OSI) communications model, the network layer's primary function is to move data into and through other networks. Margaret Rouse WhatIs.com 27 Mar 2018 Contributor(s): Andrew Froehlich Located at Layer 3 of the Open Systems Interconnection (OSI) communications model, the network layer's primary function is to move data into and through other networks. Network layer protocols accomplish this goal by packaging data with correct network address information, selecting the appropriate network routes and forwarding the packaged data up the stack to the transport layer (Layer 4). Existing protocols that generally map to the OSI network layer include the IP portion of the Transmission Control Protocol/Internet Protocol (TCP/IP) model -- both IPv4 and IPv6 -- as well as NetWare Internetwork Packet Exchange/Sequenced Packet Exchange (IPX/SPX). The routing information contained within a packet includes the source of the sending host and the eventual destination of the remote host. This information is contained within the network layer header that encapsulates network frames at the data link layer (Layer 2). The key difference -- and importance -- between transport information contained at Layer 2 when compared to transport information contained at the network layer is that the information can move beyond the local network to reach hosts in remote network locations. Functions of the network layer The primary function of the network layer is to permit different networks to be interconnected. It does this by forwarding packets to network routers, which rely on algorithms to determine the best paths for the data to travel. These paths are known as virtual circuits. The network layer relies on the Internet Control Message Protocol (ICMP) for error handling and diagnostics to ensure packets are sent correctly. Quality of service (QoS) is also available to permit certain traffic to be prioritized over other traffic. The network layer can support either connection-oriented or connectionless networks, but such a network can only be of one type and not both.

ohm value

Ohm Definition and Usage The ohm is the resistance between two points of an electrical conductor transmitting a current of one ampere when the potential difference is one volt.[1] The ohm is the SI derived unit for electrical resistance in the metric system. Ohms can be abbreviated as Ω; for example, 1 ohm can be written as 1 Ω. Ohm's Law states the current between two points on a conductor is proportional to the voltage and inversely proportional to the resistance. Using Ohm's Law, it's possible to express the resistance in ohms as an expression using current and voltage. RΩ = VVIA The resistance in ohms is equal to the potential difference in volts divided by the current in amperes. Background and Origin The ohm is named for the German physicist Georg Simon Ohm, who discovered Ohm's Law. The ohm has been in use since the late 1800's, although it's been redefined several times. Ohms Measurement Conversion Table

PoE switch

Power over Ethernet. A device which transfers small amounts of DC current over Ethernet cable, along with data, to power PoE devices. commonly marked - on the switch or interfaces

SCSI

SCSI (pronounced SKUH-zee and sometimes colloquially known as "scuzzy"), the Small Computer System Interface, is a set of American National Standards Institute (ANSI) standard electronic interfaces that allow personal computers (PCs) to communicate with peripheral hardware such as disk drives, tape drives, CD-ROM ...

wap

Stands for 'Wireless Application Protocol'. A Wireless Access Point (WAP) is a networking device that allows wireless-capable devices to connect to a wired network. Instead of using wires and cables to connect every computer or device in the network, installing WAPs is a more convenient, more secure, and cost-efficient alternative. Wireless application protocol (WAP) is an application environment and set of communication protocols for wireless devices designed to enable manufacturer-, vendor-, and technology-independent access to the Internet and advanced telephony services.

Trunking

Telecommunication systems that allow a computer to maximize utilization of a group of frequencies. What does trunk mean in networking? A trunk is a single channel of communication that allows multiple entities at one end to correspond with the correct entity at the other end. It is a "link" that carries many signals at the same time, creating more efficient network access between two nodes. Types There are two trunking protocols used on modern communication networks: Inter-Switch Link (ISL) from Cisco and the aforementioned nonproprietary IEEE 802.1Q. Of the two, IEEE 802.1Q is the industry standard. Even Cisco switches now use IEEE 802.1Q (dot1q) by default.

IP Addressing

The addressing scheme of the IP protocol by which each machine on a TCP/IP network gets a unique address that identifies the machine. These addresses group together sets of computers into logical networks, and equipment that understands TCP/IP addressing can communicate with each other between LANs, in a WAN. Network layer - automatically assign via DHCP from the ISP - may require Authentication then interface - internal IP address and subnet mask of the router - DHCP address range for other devices - DNS server addresses

Plenum

The area above the ceiling tile or below the subfloor in a building. - plenum space building air circulation. heating and air conditioning system. concerns in the case of a fire - smoke and toxic fumes worst-case planning important concerns for any structure active/circulating plenum air space forced air return forced air supply drop ceiling living working space of a typical commercial building these were the words on the diagram from Professor Messer

2.4 gigahertz versus 5 gigahertz

The primary difference between 2.4 and 5GHz bands is the range (coverage) and the bandwidth (speed) that these bands provide. For instance, the 2.4GHz band offers coverage at a longer range; however, it transmits data at slower speeds. Instead, the 5GHz band gives less coverage but sends data at faster speeds https://www.tanaza.com/blog/5ghz-vs-2-4ghz/#:~:text=The%20primary%20difference%20between%202.4,sends%20data%20at%20faster%20speeds.

tcp/20, active mode data

What is TCP 20? File Transfer Protocol (Default Data Channel) Description: The FTP protocol uses a pair of connections between the FTP client and FTP server. The connection with the FTP server's port 20 is the second connection created during an FTP session, the first one being to the server's port 21. The File Transfer Protocol provides a framework to transfer information between two networked computers, much like Hypertext Transfer Protocol does through a web browser. FTP, however, operates on two different Transmission Control Protocol ports: 20 and 21. FTP ports 20 and 21 must both be open on the network for successful file transfers.

WORM drive technology.

What is a worm drive motor? In computer storage media, WORM (write once, read many) is a data storage technology that allows information to be written to a disc a single time and prevents the drive from erasing the data. Write Once Read Many.

What is corona wire in printer?

What is corona wire in printer? A charged wire in a laser printer that draws the toner off the drum onto the paper. It must be cleaned when the toner cartridge is replaced.

ENDEC:

What is the name of the device that generates waveforms to optimize placement of flux patterns on the disk during writing and converts the waveforms back into binary data during reading? A device which acts as both an encoder and a decoder on a signal or data stream, either with the same or separate circuitry or algorithm.

A traditional firewall allows you to filter information based on the UDP port number or the TCP port number.

You may sometimes see this referred to as OSI layer 4 filtering.

DSL modem

a broadband modem that sends digital data and information from a computer to a DSL line and receives digital data and information from a DSL line ADSL asymmetric digital subscriber line - use existing telephone lines download speed is faster than the upload speed asymmetric - 10000 foot limitations from the central office Co - 52 megabits Downstream 16 megabits Upstream are common - faster speeds may be possible if closer to the co

DSL modem

a broadband modem that sends digital data and information from a computer to a DSL line and receives digital data and information from a DSL line ADSL asymmetric digital subscriber line - uses telephone lines download speed is faster than the upload speed asymmetric - 10000 foot limitation from the central office CO - 52 megabits Downstream 16 megabits Upstream are common - faster speeds may be possible if closer to the CO

DNS server

a computer or a group of computers that maintain a database to enable a computer to know the IP address of a URL - converts names to IP addresses - and vice versa distributed naming system - the load is balanced across many different servers usually managed by the ISP or Enterprise it Department - a critical resource

Intrusion Detection System (IDS)

a computer program that senses when another computer is attempting to scan or access a computer or network An intrusion prevention system (IPS) is a form of network security that works to detect and prevent identified threats. Intrusion prevention systems continuously monitor your network, looking for possible malicious incidents and capturing information about them.

file server (network server)

a computer that contains various software and data files for a local area network and contains the network operating system centralized storage of documents, spreadsheets, videos, pictures, and any other files standard system of file management - SMB server message block Apple filing protocol AFP, Etc the front and hides the protocol - copy, delete, rename, Etc

wireless network

a network where users can access the Internet without the use of fixed cables

thunderbolt

a port that transmits both video and data on the same port and cable. The port is shaped the same as the DisplayPort and is compatible with DisplayPort devices. high speed serial connector - data and Power on the same cable- based on Mini DisplayPort mdp standard Thunderbolt V1 - two channels - 10 gigabit per second Channel - 20 gigabits-per-second total thoroughput - Mini DisplayPort connector Thunderbolt V2 - 20 GB per second aggregated channels - Mini DisplayPort connector ag·gre·gate verb past tense: aggregated; past participle: aggregated /ˈaɡrəˌɡāt/ form or group into a class or cluster. "the butterflies aggregate in dense groups" COMPUTING collect (related items of content) so as to display or link to them. "tools that aggregate data from all of the security devices are a good first step" Thunderbolt V3 - 40 gigabytes a second aggregated thoroughput - USB C connector maximum 3 Meters copper - 60 M Optical - daisy chain up to six devices

NFC near field communication

a protocol, based on RFID, that defines how a network uses close-range radio signals to communicate between two devices or objects equipped with NFC technology two-way wireless communication - Belgian RFID, which is most likely one way payment systems - major credit cards - online wallets bootstrap for other Wireless - NFC helps with Bluetooth pairing access token, identity "card" - short range with encryption support

authentication server

a server that keeps track of who is logging on to the network and which services on the network are available to each user log in authentication to resources - centralized management almost always an Enterprise service - not required on a home network usually a set of redundant servers - always available - extremely important service

file server

a server that stores and manages files for network users centralized storage of documents, spreadsheets, videos, pictures, and any other files standard system of file management - SMB server message block - Apple filing protocol AFP, e t c. the front end hides the protocol - copy delete rename Exedra

WiMAX (Worldwide Interoperability for Microwave Access)

also known as 802.16, is a network standard developed by IEEE that specifies how wireless devices communicate over the air in a wide area.

xerography

an electrostatic method of reproducing images on paper Xerography is a dry photocopying technique.[1] Originally called electrophotography, it was renamed xerography—from the Greek roots ξηρός xeros, "dry" and -γραφία -graphia, "writing"—to emphasize that unlike reproduction techniques then in use such as cyanotype, the process of xerography used no liquid chemicals.[2]

print server

connect a printer to the network - provide printing services for all network devices maybe software in a computer -computer is connected to the printer may be built into the printer - network adapter and software uses standard printing protocols - SMB server message block -IPP INTERNET PRINTING PROTOCOL -LPD line printer Daemon

whitelist/Blacklist

content filtering, IP address ranges - or a combination whitelisting - nothing pass through the firewall unless it's approved - very restrictive blacklisting - nothing on the "bad list" is allowed - specific urls - domains - IP addresses

Layer 3: Network Layer

controls the operations of the subnet, deciding which physical path the data takes.

Fiber

fiber optics to the home - high speed networking converged services voice, video, data enhanced features - hundreds of HD channels - 1 gigabit per second internet access - 1 terabyte of cloud storage - 2tb DVR

Configuring NAT

for Soho devices this is automatic - Source Nat, also called Pat port address translation. - all internal devices are translated to a single external address

the importance of cable

fundamental to network communication - incredibly important foundation Google usually only get one good opportunity at building your cabling infrastructure - make it good! the vast majority of wireless communication uses cables - it has to plug in somewhere

the importance of cable

fundamental to network communication-- incredibly important foundation usually only get one good opportunity of building your cable infrastructure-- make it good the vast majority of wireless communication uses cables - it has to plug in somewhere

crimping best practices

get a good crimper - and a good pair of electrician scissors - cable snips - and a good wire stripper make sure you use the correct modular connectors -differences between wire types if you do start building out your own cables practice, practice, practice - it won't take long to become proficient

Firewalls

hardware, software, or both designed to prevent unauthorized persons from accessing electronic information filters traffic by port number - OSI layer 4 (TCP/UDP) -- some firewalls can filter based on the application can encrypt traffic into/out of the network. - protect your traffic between sites. can proxy traffic - a common security technique most firewalls can be layer 3 devices routers - usually sits on the Ingress/egress of the network.

Bridge

imagine a switch with 2 or 4 ports - makes forwarding decisions in software connects different physical Networks - can connect different topologies - gets around physical Network size limitations/collisions. distributes traffic based on Mac address an example of a modern Bridge is a wireless access point - Bridges wired ethernet to wireless

mimo

intel: support Learn about Multiple-Input Multiple-Output Documentation Content Type Product Information & Documentation Article ID 000005714 Last Reviewed 10/19/2020 What is Multiple-Input Multiple-Output? Multiple-Input Multiple-Output (MIMO) is a wireless technology that uses multiple transmitters and receivers to transfer more data at the same time. All wireless products with 802.11n support MIMO. The technology helps allow 802.11n to reach higher speeds than products without 802.11n. To implement MIMO, the station (mobile device) or the access point (AP) must support MIMO. For optimal performance and range, both the station and the AP must support MIMO. MIMO technology uses a natural radio-wave phenomenon called multipath. With multipath, transmitted information bounces off walls, ceilings, and other objects, reaching the receiving antenna multiple times at different angles and slightly different times. In the past, multipath caused interference and slowed down wireless signals. With multipath, MIMO technology uses multiple, smart transmitters and receivers with an added spatial dimension, increasing performance and range. MIMO increases receiver signal-capturing power by enabling antennas to combine data streams arriving from different paths and at different times. Smart antennas use spatial diversity technology, which puts surplus antennas to good use. When antennas outnumber spatial streams, the antennas can add receiver diversity and increase range. More antennas usually equate to higher speeds. A wireless adapter with three antennas can have a speed of 600 Mbps. An adapter with two antennas has a speed of 300 Mbps. The router needs multiple antennas and must fully support all features of 802.11n to attain the highest speed possible. Legacy wireless devices use Single-Input Single-Output (SISO) technology. They can only send or receive one spatial stream at a time.

what layer does the TCP and UDP and SPX protocols reside at?

layer 4 transport: ensures that messages are delivered error-free. in sequence and with no losses or duplications.

LMS

library management system

data redundancy

the unnecessary storing of duplicate data in two or more tables hard drive store huge amounts of data - important data hard drives are moving components - they will eventually break what happens to the data when the drive fails? - you can prepare for that - use an array of drives

coaxial cable

two or more forms share a common axis wire conductor the wire in the middle dielectric insulator the white insulator around the wire conductor metal shielding the copper metal shielding around the dielectric insulator plastic jacket RG6 used in television - digital cable - and high-speed internet over cable rg59 used as patch cables - not designed for long distances

cellular Networks

use cell towers to transmit voice and data over large distances mobile devices -"cell" phones separate land into "cells" - antenna coverage is a cell with certain frequencies 2G Networks - GSM global system for mobile Communications - CDMA code division multiple access poor data support - original use circuit switching - minor upgrades for some packet switching

RFID radio-frequency identification

uses radio signals to communicate with a tag placed in or attached to an object it's everywhere - access badges - inventory/assembly-line tracking - pet/animal identification - anything that needs to be tracked an RFID tag can be small and shaped just like a grain of rice an RFID tag can also be a flat sticker with wire like meshing placed on there radar technology - radio energy transmitted to the tag - RF Powers the tag, ID is transmitted back - bidirectional communication - sometag formats can be active/powered

ip version 4 socket exist when:

we have: 1. a client up address 2 a protocol either tcp or udp 3 a port number "Putting these all together then, we have what's known as an IP socket, which means we have a server's IP address. We have a protocol such as TCP or UDP, and we have a port number that's used. The same thing applies on the client side. We can have a client IP address, a protocol, and a client port number. All of these together would be IP version 4 sockets." Professor Messer

The 66 block (older type/used in telephony) The 110 block (newer type/used in networking)

we're going to need the correct punch down tool for either one of these type of methods. there are also a lot of different connectors that might be used depending on which block you're using.

satellite networking

• 15 Mbit/s down, 2 Mbit/s up • High latency (250 ms up, 250 ms down) • High frequencies (line of sight, rain fade) communication to a satellite - non-terrestrial communication high cost relative to terrestrial networking - 50 megabits down 3 megabits up are common - remote sites, difficult to network sites High latency - 250 Ms up, 250 Ms down high frequencies- 2 gigahertz - line of sight, rain fade

managing qos quality of service

• Change the priority of your traffic • Prioritize applications, ports, or MAC addresses change the priority of your traffic - voice is high, World of Warcraft is low - or vice versa prioritize applications, porch, or Mac addresses - not all of them may allow for the highest encryption use an open frequency - some access points will automatically find good frequencies

Wireless channels and encryption

• Configure for the highest encryption possible • Choose WPA2-AES over WPA configure for the highest encryption possible - choose WPA2 of over WPA - WEP is not an appropriate option check your devices - not all of them may allow for the highest encryption use an open frequency - some access points will automatically find good frequencies

Legacy and embedded systems

• Embedded systems - Purpose-built device • Not usual to have direct access to the operating system • Alarm system, door security, network switch Legacy systems - another expression for "really old" - may also be "really important" - learning old things can be just as important as learning the new things embedded systems - purpose-built device - not usual to have direct access to the operating system - alarm system, door security, time card system

firewall and DMZ ports

• Every SOHO router is also a firewall • DMZ ports can be configured to allow unrestricted access every Soho router is also a firewall - no external device can directly access the internal Network - this normally can't be disabled DMZ ports can be configured to allow unrestricted access - this is almost always a bad idea - consider creating more specific port forwarding rules - or perhaps don't allow any access

raid 5 striping with parity

• File blocks are striped along with a parity block • Efficient use of disk space • High redundancy • Minimum of 3 drives . along with a parody block efficient use of Drive space - data is available after drive failure - parody calculation may affect performance disk0 - block 1A - block 1B - block 1C - parody D disc 1 block 2A block 2B parody c block 1D disc 2 block 3 parody B block 2 C block 2D disc 3 parodyA block 3B block 3C block 3D

PLC (Power Line Communication)

• May be marketed as Ethernet over Power (EOP) • 500 megabits per second PLC or Power Line Communication. And it's an IEEE standard numbered 1901. This EoP standard operates at 500 megabits per second, and it's designed to connect devices that normally wouldn't be connected to our ethernet.

cellular Networks

• Mobile devices - "Cell" phones • Tethering - Turn your phone into a wireless router • Mobile hotspot - Standalone networking device mobile devices - cell phones separate land into "cells" - antenna coverage is a cell with certain frequencies tethering - turn your phone into a wireless router mobile hotspot - stand-alone devices - use your phone for other things

IDS/IPS

• Network-based Intrusion Detection System / Intrusion Prevention System • Intrusions - Exploits against operating systems, applications, etc. • Buffer overflows, cross-site scripting, other vulnerabilities • Detection - Alarm or alert • Prevention - Stop it before it gets into the network


Related study sets

Chapter 11: Income and Expenditure

View Set

Chapter 11 - The Health Care Delivery System

View Set

Patho CYU Chapters 27, 28, 29, 31, 33

View Set

Financial Accounting - Module 3: Introduction to the accounting cycle

View Set