An A-Z glossary of technological terminology.
Access control lists – further filter access and traffic forwarding.
Agility and rapid deployment – IT department can focus on delivering knowledge.
Antivirus and anti-spyware – Protects devices from malicious software.
Application protocol – Controls the way a web server and web client interacts.
Broadcast – One-to-all delivery used when all hosts on the same network need the same message at the same time.
Business DSL – Available on various formats. SDSL is a popular choice and is similar to ADSL providing the same upload/download speeds.
Cable – The Internet data signal travels along the same coaxial cable that delivers cable TV. Provides a high bandwidth, always on connection to the Internet.
Cellular – Cellular Internet uses a mobile network to connect. Wherever you get signal you can get the Internet.
Circuit-switch connection-oriented networks – If a link or device in a circuit fails the connection is dropped. When the connection is picked back up again it is done so by using a different circuit.
Clients – Computer hosts that have software enabling them to request and display information obtained from another server.
Collaboration tool – A tool used to help people work together to achieve a common goal or objective. Work through a process, distribute pieces and tasks to involved parties and help coordinate activities.
Convergence – The state of a set of routers that have the same topology information about the internetwork in which they operate.
Dail- up telephone – Uses any phone line and modem.Has a low bandwidth, not sufficient for large data transfer.
Data interception and theft – An attack to capture private information from an organization.
Dedicated Firewall system – Provide advanced firewall capability, can filter large amounts of traffic.
Dedicated leased line – A dedicated connection from the SP to the customer.
Denial of service – An attack designed to slow down or crash applications and processes.
DHCP – Enables automatic IPv4 address configuration for an end device.
DSL – Provides a high bandwidth, always on connection to the Internet. It requires a special high-speed modem that separates the DSL signal from the telephone and provides an Ethernet connection to the host.
Dynamically – A variable or Constantly changing nature.
Email client and server – Clients use their mail client software, like Microsoft Outlook to access emails on the server.
End devices –
- Desktop computer.
- IP phone.
- Wireless tablet.
- Telepresence endpoint.
Ensuring availability – The Assurance of timely and reliable access to data services for authorized people.
Ensuring confidentiality – Only the intended and authorized users can access and read the data.
Fault Tolerance – Limits the impact of failure ensuring the fewest number of devices are impacted.
File client and server – Stores files to the clients device and accessing the file with client software attached to Windows Explorer.
Finite – Limited to size or extent.
Firewall appliance – Secures outgoing and incoming traffic.
Firewall filtering – Blocks unauthorized access to the network.
Hacker attack – A knowledgeable person attacks user devices or network resources.
Hardware – Physical part of the computer including electronics.
Hierarchical – Arranged in order of rank.
Hosts – Can send and receive messages on the network.
Identity theft – An attack to steal login information of a user to then access private data.
Infrastructure – A basic system and service.
Integrated – Combining or coordinating separate elements to provide harmonious, interrelated whole.
Interface – A specialized port on an internetworking device connected to an individual network.
Intermediary devices –
- Wireless router.
- LAN switch.
- Multi layer switch.
- Firewall appliance.
Internet protocol – Formats segments turning them into packets and giving them the correct address before moving them on.
Intrusion prevention system – Identifies fast spreading threats like Zero-day or Zero-hour attacks.
IOE – Brings people together, process data and make network connections more relevant and valuable. Turning information into actions creating new capabilities.
IP address – Together with the subnet mask, identifies end devices on the internetwork.
Kernel – Manages communication between the hardware and software.
LAN – A network infrastructure that provides access to users and end devices in a small geographical area.
Logical topology diagram – Identifies devices, ports and IP addressing schemes.
MAN – A network infrastructure that spans a physical area larger than a LAN but smaller than a WAN. Typically operated by single large organizations.
Maintaining communication integrity – Assuring the information hasn’t been altered in transmission from origin to destination.
Metro Ethernet – Typically available over a dedicated copper or fibre connection from the SP to the customer.
Multicast – One-to-many delivery of the same message to a group of hosts.
Network access protocol – Are two functions communication over data link and physical transmission of data.
Network interface card – A NIC or LAN adapter provides a physical connection to a network at a PC or a host device.
Network media –
- Wireless media.
- LAN media.
- WAN media.
One-to-all – A message sent to a group of people.
One-to-many – A message sent to a group of people.
One-to-one – Messaging between two people.
Organizational flexibility – Can access the information anytime and anyplace.
Oriented – Tailored or adapted to specific circumstances.
Packed-switched Networks – A single message is broken down into packets with address information attached.
Physical port – A media is connected to a host or network device by either a connector or outlet.
Physical topology diagram – Identifies the physical location of intermediary devices, configured ports and cables.
QoS – Helps to ensure the quality of services provided on the Internet.
Reduced cost of infrastructure – Technology is moved from on-site to a cloud provider.
Redundancy – Multiple paths to one destination.
Router – Forwards data packets to and from the Internet.
SAN – A network infrastructure designed to support file servers and provide data storage, retrieval and replication.
Satellite – A good option for those who don’t have access to DSL or Cable.
Scalability – A scalable network can expand quickly to support new information without impacting performance.
Servers – Are hosts that have software installed enabling them to provide information to other hosts on the network.
Shell – The interface that allow users to request tasks from the computer in either CLI or GUI.
Spyware and adware – Software installed on a users device that secretly collects information on the user.
Subnet mask – Determines which part of a large network is used by an IP address.
Switch – Connects end devices to each other.
The Internet – A network of networks.
Transport protocol – Manages each conversation individually between the web server and web client.
Traverse – Travels across, through, back, forth or sideways.
Topology – A diagram showing a network map.
Unicast – One-to-one delivery.
Virtual Interface – No physical hardware on the device associated with it.
Virtual private networks – Provides a secure access to remote work.
viruses, worms and Trojan horse – Malicious software and arbitrary code on a user device.
WAN – A network infrastructure that provides access to other networks over a wide geographical area.
Web client and server – A web server runs server software and clients use their browser software, like Windows Internet Explorer to access web pages.
Wireless access point – A radio transmitter capable of connecting end devices wirelessly.
WLAN – Similar to a LAN but wirelessly interconnects user and end points in a small geographical area.
Zero-day or zero-hour attacks – An attack that occurs on the first day a vulnerability becomes known.