Network Plus A Glossary.txt

  1. AAA is an acronym for Authentication, Authorization, and Accounting. AAA is a protocol used to control access to network devices and what services area available once access is granted. Some of the most common AAA protocols include RADIUS, Diameter, TACACS and TACACS+.
    AAA
  2. An error very similar to a crash or lockup, used to indicate a Novell server crash.
    abend
  3. ACL
    access Control List
  4. A device used to receive and transmit wireless signals within a wireless LAN and retransmit them to the networkegment. Access Points are able to connect a group of hosts or join two networks together
    access point
  5. Collection of data to track individual user usage patterns such as what data and when a user access it.
    accounting
  6. ACK
    acknowledgement
  7. Short for acknowledgements, message confirmations stating the reception of a data packet at the transport layer.
    ACKs
  8. Abbreviation for access control list, a list of rights to an object available on the network. It can also act as a firewall because it restricts access to certain parts of the network.
    ACL
  9. A device that is used to regenerate and retime network signals within a LAN. This device improves reliability of the network by providing a central wiring point for each host devices network cable.
    active hub
  10. A form of wireless communication where hosts communicate directly rather than using an access point.
    ad hoc
  11. A device that provides connectivity between a peripheral device and the device to which it is attached.
    adapter
  12. ARP
    Address Resolution Protocol
  13. ADF
    Automatic Document Feeders are a feature which allows pages to be automatically fed into a scanner, allowing multiple pages to be scanned without manual intervention.
  14. A rating of the trustworthiness of a routing information source. The higher the value, the lower the trustworthiness rating.
    administrative distance
  15. ADSL
    Acronym for asymmetric digital subscriber line, one of four DSL technologies. ADSL is designed to deliver more bandwidth downstream (from the central office to the customer site) than upstream. Downstream rates range from 1.5 to 9 Mbps, while upstream bandwidth ranges from 16 to 640 kbps. ADSL transmissions work at distances up to 18,000 feet (5,488 meters) over a single copper twisted pair.
  16. AES
    Acronym for Advanced Encryption Standard, a security algorithm that is being used as an alternative to DES.
  17. An alternate name that is given to something that already has a name. Using either name will produce the same result, as both are valid.
    alias
  18. A technique used that varies the strength of the signal in relation to the data being translated.
    AM Amplitude Modulation
  19. A bipolar transmission method which reverses the polarity of 1 bits and expresses 0 bits as 0 volts.
    AMI
  20. A signaling method that is used to transmit data whereby the electrical characteristic of the signal produced has a wave like pattern.
    analog
  21. A voluntary organization comprised of corporate, government, and other members that coordinates standards-related activities, approves US national standards, and develops positions for the United States in international standards organizations. ANSI helps develop international and US standards relating to, among other things, communications and networking. ANSI is a member of the IEC and the ISO.
    ANSI (American National Standards Institute)
  22. Software that uses several methods to protect your computer from computer viruses. It may also protect your computer from future virus attacks through virus updates
    antivirus
  23. APIPA
    Automatic Private Internet Protocol Addressing allows a host to assign itself an IP address when a DHCP server is not available. Addresses are assigned from the private range between 169.254.0.1 through 169.254.255.254. APIPA is designed for non-routed networks.
  24. A communications protocol developed by Apple Computers to provide communication between networked Macintosh computers.
    AppleTalk
  25. Layer 7 of the OSI model, it primarily deals with how an application will access network resources and application functionality.
    application layer
  26. The process of copying data to an alternate storage device so that it can be accessed and restored at a later date.
    archiving
  27. Term for a network that can use either a physical star topology or a bus topology. ARCNet was first developed in the 1970s by the Datapoint Corporation.
    ARCNet (Attached Resource Computer Network)
  28. ARP
    Abbreviation for Address Resolution Protocol, a protocol that was designed to discover the MAC address of a host from the IP address that is associated with it
  29. A table that is used by ARP, containing a list of IP addresses and a corresponding MAC addresses.
    ARP table
  30. ASCII
    Abbreviation for American Standard Code for Information Interchange, a code using numbers to represent characters and symbols.
  31. A transmission method that allows for more bandwidth in one direction over the other.
    asymmetric
  32. A transmission method that does not require a timing scheme. Asynchronous communications allows transmission at any time and the destination will accept the transmission as it is received.
    asynchronous
  33. ATDM
    Asynchronous time-division multiplexing. A technique in which information from multiple channels can be allocated bandwidth dynamically on a single wire. Compare to TDM and FDM.
  34. ATM
    Abbreviation for Asynchronous Transfer Mode, a technology based on broadband ISDN. It uses the same size 53-byte cells, instead of packets, for quicker switching through the network.
  35. The loss of communication signal energy as it travels over the line.
    attenuation
  36. Software functions that analyze what is happening on the network and create log files that can be accessed by the administrator at a later date.
    auditing
  37. AUI
    Abbreviation for Attachment Unit Interface, a port that is used to directly attach a computer to a network device.
  38. The process of verifying the identity of a user who is trying to gain access to a specific resource.
    authentication
  39. A mechanism for providing integrity and authentication for IP datagrams. It can also provide non-repudiation.
    authentication header
  40. A collection of networks, under a common administration, sharing a common routing strategy. Autonomous systems are subdivide
    autonomous system
  41. What is AVI?
    • Abbreviation for Audio Visual Interleaved, a file standard that supports video, audio, and animation. These files
    • usually have an AVI file extension.
Author
bwbarnes50
ID
44011
Card Set
Network Plus A Glossary.txt
Description
Network+ Glossary Terms A
Updated