Term
|
Definition
| One of two four-pair UTP crimping standards for 10/100/1000BASE-T networks |
|
|
Term
|
Definition
| One of two four-pair UTP crimping standards for 10/100/1000BASE-T networks. |
|
|
Term
|
Definition
| An unauthorized person attempting to follow an authorized person into a secure area. |
|
|
Term
|
Definition
| A feature of modern server chassis that will log in the motherboard’s nonvolatile RAM (NVRAM) if the chassis has been opened. The log will show chassis intrusion with a date and time. Alternatively, the special stickers or zip ties that break when a device has been opened. |
|
|
Term
|
Definition
| The connection-oriented payload of an IP packet. A TCP segment works at the Transport layer. |
|
|
Term
|
Definition
| A three-packet conversation between TCP hosts to establish and start a data transfer session. The conversation begins with a SYN request by the initiator. The target responds with a SYN response and an ACK to the SYN request. The initiator confirms receipt of the SYN-ACK with an ACK. Once this handshake is complete, data transfer can begin. |
|
|
Term
|
Definition
| A command-line packet sniffing tool. |
|
|
Term
|
Definition
| The collection of all the protocols and processes that make TCP over IP communication over a network possible. |
|
|
Term
|
Definition
| A central location for computer or telephone equipment and, most importantly, centralized cabling. All cables usually run to the telecommunications room from the rest of the installation. |
|
|
Term
| Telecommunications Industry Association (TIA) |
|
Definition
| The standards body that defines most of the standards for computer network cabling. Many of these standards are defined under the ANSI/TIA-568 standard. Since the Electronics Industry Association (EIA) was accredited by the American National Standards Institute (ANSI) to develop the standards, the name changed from TIA/EIA to ANSI/TIA after the EIA closed up shop in 2011. |
|
|
Term
|
Definition
| The science of converting sound into electrical signals, moving those signals from one location to another, and then converting those signals back into sounds. This includes modems, telephone lines, the telephone system, and any products used to create a remote access link between a remote access client and server. |
|
|
Term
|
Definition
| A program that enables users on the Internet to log onto remote systems from their own host systems. Telnet is no longer used due to its lack of encryption. |
|
|
Term
|
Definition
| Device for keeping a telecommunications room at an optimal temperature. |
|
|
Term
|
Definition
| The NSA’s security standard that is used to combat radio frequency (RF) emanation by using enclosures, shielding, and even paint. |
|
|
Term
| Temporal Key Integrity Protocol (TKIP) |
|
Definition
| The extra layer of security that Wi-Fi Protected Access (WPA) adds on top of Wired Equivalent Privacy (WEP); uses RC4 for cipher initialization. TKIP-RC4 has been replaced by CCMP-AES, which is much more difficult to crack. |
|
|
Term
| Terminal Access Controller Access Control System Plus (TACACS+) |
|
Definition
| A proprietary protocol developed by Cisco to support Authorization, Authentication, and Accounting (AAA) in a network with many routers and switches. It is similar to RADIUS in function, but uses TCP port 49 by default and separates AAA into different parts. |
|
|
Term
|
Definition
| Software that enables a PC to communicate with another computer or network as if it were a specific type of hardware terminal. |
|
|
Term
|
Definition
| Endpoint in a network segment. |
|
|
Term
| TFTP (Trivial File Transfer Protocol) |
|
Definition
| A protocol that transfers files between servers and clients. Unlike FTP, TFTP requires no user login. Devices that need an operating system, but have no local hard disk (for example, diskless workstations and routers), often use TFTP to download their operating systems. |
|
|
Term
|
Definition
| Any form of potential attack against a network. |
|
|
Term
| three-tiered architecture |
|
Definition
| A traditional type of data center architecture consisting of the access layer that provides connectivity between the data center and users, the distribution layer that interconnects racks of servers, and the core layer that ties together all the switches at the distribution layer and acts as the point of connection to the external connections, including the Internet. |
|
|
Term
| TIA/EIA (Telecommunications Industry Association/Electronics Industry Association) |
|
Definition
| The standards body that defines most of the standards for computer network cabling. Many of these standards are defined under the ANSI/TIA-568 standard. Since the Electronics Industry Association (EIA) was accredited by the American National Standards Institute (ANSI) to develop the standards, the name changed from TIA/EIA to ANSI/TIA after the EIA closed up shop in 2011. |
|
|
Term
|
Definition
| One of two four-pair UTP crimping standards for 10/100/1000BASE-T networks |
|
|
Term
|
Definition
| One of two four-pair UTP crimping standards for 10/100/1000BASE-T networks. |
|
|
Term
|
Definition
| Labeling standard/guidelines published by the Telecommunications Industry Association (TIA) and accredited by the American National Standards Institute (ANSI) for cabling in commercial buildings. Replaced the TIA/EIA-606 standard/guidelines. |
|
|
Term
| Ticket-Granting Ticket (TGT) |
|
Definition
| Sent by an Authentication Server in a Kerberos setup if the credentials sent by the client match those in its database. The client uses the TGT to request authorization for network resources from the Ticket-Granting Server. |
|
|
Term
| time-domain reflectometer (TDR) |
|
Definition
| Advanced cable tester that tests the length of cables and their continuity or discontinuity, and identifies the location of any discontinuity due to a bend, break, unwanted crimp, and so on. |
|
|
Term
|
Definition
| A field in the IP header that indicates the number of hops a packet can make before it hits its demise and gets discarded by a router. |
|
|
Term
|
Definition
| The extra layer of security that Wi-Fi Protected Access (WPA) adds on top of Wired Equivalent Privacy (WEP); uses RC4 for cipher initialization. TKIP-RC4 has been replaced by CCMP-AES, which is much more difficult to crack. |
|
|
Term
| TLS (Transport Layer Security) |
|
Definition
| hosts use public-key cryptography to securely negotiate a cipher and symmetric key over an unsecured network, and the symmetric key to encrypt the rest of the session. Current name for the historical SSL protocol. |
|
|
Term
|
Definition
| Generic term for two devices used together—a tone generator and a tone locator (probe)—to trace cables by sending an electrical signal along a wire at a particular frequency. The tone locator then emits a sound when it distinguishes that frequency. Also referred to as Fox and Hound. |
|
|
Term
|
Definition
| Generic term for two devices used together—a tone generator and a tone locator (probe)—to trace cables by sending an electrical signal along a wire at a particular frequency. The tone locator then emits a sound when it distinguishes that frequency. Also referred to as Fox and Hound. |
|
|
Term
|
Definition
| Host that receives the most data on a network. |
|
|
Term
|
Definition
| Host that sends the most data on a network. |
|
|
Term
| top-level domain (TLD) names |
|
Definition
| Peak of the hierarchy for naming on the Internet; these include the .com, .org, .net, .edu, .gov, .mil, and .int names, as well as international country codes such as .us, .eu, etc. |
|
|
Term
|
Definition
| A set of DNS servers—just below the root servers—that handle the top-level domain names, such as .com, .org, .net, and so on. |
|
|
Term
|
Definition
| An implementation of access switches in which every equipment rack uses one (or two for redundancy) Layer 2 switches sitting at the top of the rack, connecting to all the systems on the rack. Top-of-rack switches are co-resident in the rack with servers, as compared to switches that reside in a separate rack. |
|
|
Term
|
Definition
| The pattern of interconnections in a communications system among devices, nodes, and associated input and output stations. Also describes how computers connect to each other without regard to how they actually communicate. |
|
|
Term
| tracert (also traceroute) |
|
Definition
| A command-line utility used to follow the path a packet takes between two hosts. |
|
|
Term
| tracert –6 (also traceroute6) |
|
Definition
| A command-line utility that checks a path from the station running the command to a destination host. Adding the –6 switch to the command line specifies that the target host uses an IPv6 address. traceroute6 is a Linux command that performs a traceroute to an IPv6 addressed host. |
|
|
Term
|
Definition
| The process of extracting knowledge from traffic flows on a network. |
|
|
Term
|
Definition
| Controlling the flow of packets into or out of the network according to the type of packet or other rules. |
|
|
Term
|
Definition
| Unusual and usually dramatic increase in the amount of network traffic. Traffic spikes may be the result of normal operations within the organization or may be an indication of something more sinister. |
|
|
Term
|
Definition
| The portion of an Ethernet frame that is the frame check sequence (FCS). |
|
|
Term
|
Definition
| Interchangeable network modules that make it easy to change the media (and associated Ethernet standards) a network device uses. Most often used to provide fiber-optic interfaces for switches, routers, and NICs. |
|
|
Term
| Transmission Control Protocol (TCP) |
|
Definition
| A Layer 4 connection-oriented protocol within the TCP/IP suite. TCP provides a reliable communications channel over an unreliable network by ensuring all packets are accounted for and retransmitted if any are lost. |
|
|
Term
| Transmission Control Protocol/Internet Protocol (TCP/IP) |
|
Definition
| A set of communication protocols developed by the U.S. Department of Defense that enables dissimilar computers to share information over a network. IP provides an address scheme and delivers packets between hosts, while TCP ensures the data is transferred reliably and accurately. |
|
|
Term
|
Definition
| A multiple-antenna technology in 802.11n WAPs that helps get rid of dead spots. |
|
|
Term
|
Definition
he fourth layer in the open systems interconnection (OSI) network model.
The OSI model divides the tasks involved with moving information between networked computers into seven smaller, more manageable task groups. Each of the seven OSI layers is assigned a task or group of tasks.
The transport layer's tasks include error correction as well as segmenting and desegmenting data before and after it's transported across the network. This layer is also responsible for flow control and making sure that segmented data is delivered over the network in the correct sequence.
Layer 4 (the transport layer) uses the transmission control protocol (TCP) & user data protocol (UDP) to carry out its tasks. |
|
|
Term
| Transport Layer Security (TLS) |
|
Definition
| hosts use public-key cryptography to securely negotiate a cipher and symmetric key over an unsecured network, and the symmetric key to encrypt the rest of the session. Current name for the historical SSL protocol. |
|
|
Term
|
Definition
| Out-of-tolerance condition in an SNMP managed device. |
|
|
Term
| Trivial File Transfer Protocol (TFTP) |
|
Definition
| A protocol that transfers files between servers and clients. Unlike FTP, TFTP requires no user login. Devices that need an operating system, but have no local hard disk (for example, diskless workstations and routers), often use TFTP to download their operating systems. |
|
|
Term
|
Definition
| A virus that masquerades as a file with a legitimate purpose, so that a user will run it intentionally. A common example would be a fake antivirus program that introduces some kind of malicious program under the guise of protecting the computer. |
|
|
Term
|
Definition
| A port on a switch configured to carry all data, regardless of VLAN number, between all switches in a LAN. |
|
|
Term
|
Definition
| The process of transferring VLAN data between two or more switches. |
|
|
Term
|
Definition
| An account that has been granted specific authority to perform certain or all administrative tasks. |
|
|
Term
|
Definition
| An encrypted link between two programs on two separate computers. |
|
|
Term
|
Definition
| In IPv6, a service that creates the actual tunnel and (usually) offers a custom-made endpoint client for you to use, although more advanced users can often make a manual connection. |
|
|
Term
| Tunnel Information and Control (TIC) protocol |
|
Definition
| One of the protocols that sets up IPv6 tunnels and handles configuration as well as login. |
|
|
Term
| Tunnel Setup Protocol (TSP) |
|
Definition
| One of the protocols that sets up IPv6 tunnels and handles configuration as well as login. |
|
|
Term
|
Definition
| Twisted pairs of cables, the most overwhelmingly common type of cabling used in networks. The two types of twisted pair cabling are UTP (unshielded twisted pair) and STP (shielded twisted pair). The twists serve to reduce interference, called crosstalk; the more twists, the less crosstalk. |
|
|
Term
| two-factor authentication |
|
Definition
| A method of security authentication that requires two separate means of authentication; for example, some sort of physical token that, when inserted, prompts for a password. Also called multifactor authentication (MFA). |
|
|
Term
|
Definition
| Freeform type of DNS record that holds a text value. Most commonly used for SPF, DKIM, and DMARC. |
|
|
Term
|
Definition
| Part of an Ethernet frame that describes/labels the frame contents. |
|
|
Term
|
Definition
| The unique height measurement used with equipment racks; 1 U equals 1.75 inches. |
|
|
Term
|
Definition
| One of three components of a unified communication (UC) network, it is used to handle voice, video, and more. |
|
|
Term
|
Definition
| One of three components of a unified communication (UC) network, it is an edge device used to add extra services to an edge router. |
|
|
Term
|
Definition
| One of three components of a unified communication (UC) network, it is typically a dedicated box that supports any UC-provided service. |
|
|
Term
| UDP (User Datagram Protocol) |
|
Definition
| Connectionless protocol in the TCP/IP suite. Has less overhead and better performance than TCP, but also a higher risk of errors. Fire-and-forget UDP datagrams do a lot of important behind-the-scenes work in a TCP/IP network. |
|
|
Term
|
Definition
| A connectionless networking container used in UDP communication. |
|
|
Term
| ultra-physical contact (UPC) connector |
|
Definition
| Fiber-optic connector that makes physical contact between two fiber-optic cables. The fibers within a UPC are polished extensively for a superior finish and better junction integrity. |
|
|
Term
|
Definition
| Unsecure communication between two hosts that pass data using cleartext. A Telnet connection is a common unencrypted channel. |
|
|
Term
|
Definition
| A unique IP address that identifies a specific host on a network. |
|
|
Term
|
Definition
| An antenna that focuses all of its transmission energy in a single, relatively narrow direction. Similarly, its design limits its ability to receive signals that are not aligned with the focused direction. |
|
|
Term
| unified communication (UC) |
|
Definition
| A system that rolls many different network services into one. Instant messaging (IM), telephone service, and video conferencing are a few examples. |
|
|
Term
| unified threat management (UTM) |
|
Definition
| A firewall that is also packaged with a collection of other processes and utilities to detect and prevent a wide variety of threats. These protections include intrusion detection systems, intrusion prevention systems, VPN portals, load balancers, and other threat mitigation apparatus. |
|
|
Term
|
Definition
| Complete self-contained Internet services that rely on nothing more than software installed on computers and the computers’ microphone/speakers to provide voice telecommunication over the Internet. All of the interconnections to the public switched telephone network (PSTN) are handled in the cloud. |
|
|
Term
| uniform resource locator (URL) |
|
Definition
| An address that defines the type and the location of a resource on the Internet. URLs are used in almost every TCP/IP application. An example of HTTPS URL is https://www.totalsem.com. |
|
|
Term
| uninterruptible power supply (UPS) |
|
Definition
| A device that supplies continuous clean power to a computer system the whole time the computer is on. Protects against power outages and sags. The term UPS is often used mistakenly when people mean standby power supply or system (SPS). |
|
|
Term
|
Definition
| The unique height measurement used with equipment racks; 1 U equals 1.75 inches. |
|
|
Term
|
Definition
| A family of computer software operating systems (including macOS and Linux) descended from or heavily influenced by AT&T’s UNIX |
|
|
Term
|
Definition
| transfers data between hosts in an unencrypted (cleartext) format. If these packets are intercepted between the communicating hosts, their data is completely exposed and readable. |
|
|
Term
| unshielded twisted pair (UTP) |
|
Definition
| A popular cabling for telephone and networks composed of pairs of wires twisted around each other at specific intervals. The twists serve to reduce interference (also called crosstalk). The more twists, the less interference. The cable has no metallic shielding to protect the wires from external interference, unlike its cousin, STP. Gigabit Ethernet (1000BASE-T) uses UTP, as an example. UTP is available in a variety of grades |
|
|
Term
|
Definition
| Regular analog phone lines, not used for data communications |
|
|
Term
|
Definition
| Supports speeds up to 4 Mbps |
|
|
Term
|
Definition
| Supports speeds up to 16 Mbps |
|
|
Term
|
Definition
| Supports speeds up to 20 Mbps |
|
|
Term
|
Definition
| Supports speeds up to 100 Mbps |
|
|
Term
|
Definition
| Supports speeds up to 100 Mbps with two pairs and up to 1000 Mbps with four pairs |
|
|
Term
|
Definition
| Improved support for speeds up to 10 Gbps |
|
|
Term
|
Definition
| Extends the length of 10-Gbps communication to the full 100 meters commonly associated with UTP cabling |
|
|
Term
|
Definition
| A standard (unrecognized by TIA) for UTP wiring with support for 10+ Gbps |
|
|
Term
|
Definition
| An account that has been granted no administrative powers. |
|
|
Term
|
Definition
| Port on a switch that enables you to connect two switches together using a straight-through cable. |
|
|
Term
|
Definition
| The transfer of information from a user’s system to a remote computer system. Opposite of download. |
|
|
Term
|
Definition
| A device that supplies continuous clean power to a computer system the whole time the computer is on. Protects against power outages and sags. The term UPS is often used mistakenly when people mean standby power supply or system (SPS). |
|
|
Term
|
Definition
| An address that defines the type and the location of a resource on the Internet. URLs are used in almost every TCP/IP application. An example of HTTPS URL is https://www.totalsem.com. |
|
|
Term
|
Definition
| Anyone who uses a computer. |
|
|
Term
|
Definition
| A record on a network server used to save information that identifies a user to the application, operating system, or network, including name, password, username, groups to which the user belongs, and other information based on the user and the OS or NOS being used. Usually defines the rights and roles a user has on a system. |
|
|
Term
| User Datagram Protocol (UDP) |
|
Definition
| Connectionless protocol in the TCP/IP suite. Has less overhead and better performance than TCP, but also a higher risk of errors. Fire-and-forget UDP datagrams do a lot of important behind-the-scenes work in a TCP/IP network. |
|
|
Term
|
Definition
| A collection of settings that corresponds to a specific user account and may follow the user, regardless of the computer at which he or she logs on. These settings enable the user to have customized environment and security settings. |
|
|
Term
|
Definition
| A security system in which each user has an account, and access to resources is based on user identity |
|
|
Term
|
Definition
| A simple, passive, double-ended connector with female connectors on both ends. UTP couplers are used to connect two UTP cable segments together to achieve longer length when it is deemed unnecessary or inappropriate to use a single, long cable. |
|
|