Term
| Access Control List (ACL) |
|
Definition
| A list that encodes the rules stating which packets are to be allowed through a firewall and which are to be prohibited. |
|
|
Term
|
Definition
| A device that connects network sites. |
|
|
Term
|
Definition
| A point in a wireless network that facilitates communication among wireless devices and serves as a point of interconncection between wireless and wired networks. |
|
|
Term
|
Definition
|
|
Term
| Asymmetric Digital Subscriber Line (ADSL) |
|
Definition
| DSL lines that have different upload and download speeds. |
|
|
Term
|
Definition
| An encryption method whereby different keys are used to encode and to decode the message. |
|
|
Term
| Asynchronous Transfer Mode (ATM) |
|
Definition
| A prtotocol that divided data into uniformly sized cells, eliminated the need for protocol conversion, and can process speeds from 1 to 156 Mbps. |
|
|
Term
|
Definition
| In measuring computer performance, the frequency and length of service outages. |
|
|
Term
|
Definition
| Internet communication lines that have speeds in excess of 256 kbps. |
|
|
Term
|
Definition
| A type of modem that provides high-speed data transmission using cable television lines. |
|
|
Term
|
Definition
| A modem that performs the conversion between analog and digital in such a way that the signal can be carried on a regular telephone line. |
|
|
Term
| DSL (Digital Subscriber line) Modem |
|
Definition
| A type of modem that does not interfere with voice telephone service and is always connected. |
|
|
Term
|
Definition
| The process of transforming clear text into coded, unintelligble text for secure storage or communication. |
|
|
Term
|
Definition
| Algorithms used to transform clear text into coded, unintelligible text for secure storage or communication. |
|
|
Term
|
Definition
| Another name for the IEEE 802.3 protocol. It operates on Layers 1 and 2 of the TCP/IP-OSI architecture. |
|
|
Term
|
Definition
| A computing device located between a firm's internal and external networks that prevents unauthorized access to or from the internal network. |
|
|
Term
|
Definition
| A protocol that can process traffic in the range of 56 kbps to 40 Mbps by packaging data into frames. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| This standard, also called the Ethernet, is a network protocol that works on Layers 1 and 2 of the TCP/IP-OSI architecture. |
|
|
Term
|
Definition
| A wireless communications standard, widel used today, that enables acess within a few hundred feet. |
|
|
Term
|
Definition
| An emerging wireless communciations standard, also know as WiMax, that enables broadband wireless access for fixed, nomadic, and portable applications. |
|
|
Term
|
Definition
| A firewall that sits inside the organizational network. |
|
|
Term
|
Definition
| The public network of networks. |
|
|
Term
|
Definition
| A private network of networks. |
|
|
Term
| Internet Service Provider (ISP) |
|
Definition
| It provides users with Internet access, by passing communications back and forth between user and the Internet. |
|
|
Term
|
Definition
| A number used to encrypt data. |
|
|
Term
|
Definition
| In measuring computer performance, the transmission delay that occurs due to network congetstion during busy periods. |
|
|
Term
|
Definition
| A network that connects computers that reside in a single geographic location on the premises of the company that operates the LAN. |
|
|
Term
|
Definition
| In measuring computer performance, the frequency of problems in the communications network that necessitate data retransmission. |
|
|
Term
| MAC (Mediat Access Control) Address |
|
Definition
| A permanent address fiven to each network interface card at the factory. |
|
|
Term
|
Definition
| Converts the computer's digital data into signals that can be transmitted over telephone or cable lines. |
|
|
Term
|
Definition
| Internet communication lines that have transmission speeds of 56 kbps or less. |
|
|
Term
|
Definition
| A collection of computers that communicate with one another over transmission lines. |
|
|
Term
| Network Interface Card (NIC) |
|
Definition
| A hardware component on each devide on a network that connects teh device's circuitry to the communications line. |
|
|
Term
|
Definition
| A WAN connection alternative, where lines are leased from telecommunications companies and connected into a network. |
|
|
Term
|
Definition
| A built-in network interface card. |
|
|
Term
|
Definition
| A cable made of glass that uses light rays to convert from analog to digital. |
|
|
Term
| Packet- Filtering Firewall |
|
Definition
| A firewall that examines each packet and determines whether to let the packet to pass. |
|
|
Term
|
Definition
| Commitments to certain levels of service quality, made by vendors of communications equipment and services to their customers. |
|
|
Term
|
Definition
| A firewall that sits outside the organizational network. |
|
|
Term
| Point-to-Point Protocol (PPP) |
|
Definition
| A Layer 2 protocol used for networks that involve just two computers. |
|
|
Term
|
Definition
| The location at which a line connects a PSDN network. |
|
|
Term
|
Definition
| The difficulty involved in getting the capacity of fast optimal=fiber transmission lines from the street in front of buildings into the homes ans smaller businessess located in those buildings. |
|
|
Term
|
Definition
| A standardized means for corrdinating an activity between two or more entities. |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
| Public Switched Data Network (PSDN) |
|
Definition
| A network of computers and leased lines is developed and maintained by a vendor that leases time on the network to other organizations. |
|
|
Term
|
Definition
| A specail-purpose computer that moves network traffic from one node on a network to another. |
|
|
Term
| Secure Socket Layer (SSL) |
|
Definition
| A protocol that uses both asymmetric and symmetric encryption. |
|
|
Term
|
Definition
| A special-purpose computer that receives and transmits data across a network. |
|
|
Term
|
Definition
| The same key is used to encode and decode the message. |
|
|
Term
| Symmetrical Digital Subscriber Line (SDSL) |
|
Definition
| DSL lines that have the same upload and download speeds. |
|
|
Term
|
Definition
| The degree to which the user is unaware of the underlying communications system. |
|
|
Term
| Transport Layer Security (TLS) |
|
Definition
| A protocol that works between Level 4 (transport) and Level 5 (application) of the TCP/IP-OSI architecture. |
|
|
Term
|
Definition
| A virtual, private pathway over a public or shared network from the VPN client to the VPN server. |
|
|
Term
| Unshielded Twisted Pair (UTP) Cable |
|
Definition
| A UTP cable that has four pairs of twisted wire that is used to connect devices on a LAN network. |
|
|
Term
| Virtual Private Network (VPN) |
|
Definition
| A WAN connection alternative that uses the Internet or a private internet to create the appearance of private point-to-point connections. |
|
|
Term
|
Definition
| A network that connects computers located at different geographic locations. |
|
|
Term
|
Definition
| Designed to deliver the "last mile" of broadband and could potentially replace cable and DSL. |
|
|
Term
|
Definition
| Devices that enable wireless networks by communication with wireless access points. |
|
|