Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:

Network Plus 2005 In Depth

.pdf
Скачиваний:
85
Добавлен:
12.02.2015
Размер:
17.39 Mб
Скачать

822 Glossary

Transport layer—The fourth layer of the OSI Model. In the Transport layer, protocols ensure that data are transferred from point A to point B reliably and without errors. Transport layer services include flow control, acknowledgment, error correction, segmentation, reassembly, and sequencing.

tree—A logical representation of multiple, hierarchical levels in a directory. It is called a tree because the whole structure shares a common starting point (the root), and from that point extends branches (or containers), which may extend additional branches, and so on.

tree object—In NetWare terminology, the object that represents the root of an eDirectory tree.

Triple DES (3DES)—The modern implementation of DES, which weaves a 56-bit key through data three times, each time using a different key.

Trivial File Transfer Protocol—See TFTP.

Trojan—See Trojan horse.

Trojan horse—A program that disguises itself as something useful, but actually harms your system.

trust relationship—The relationship between two domains on a Windows Server 2003 network that allows a domain controller from one domain to authenticate users from the other domain.

TTL (Time to Live)—A number that indicates the maximum time that a datagram or packet can remain on the network before it is discarded. Although this field was originally meant to represent units of time, on modern networks it represents the number of router hops a datagram has endured. The TTL for datagrams is variable and configurable, but is usually set at 32 or 64. Each time a datagram passes through a router, its TTL is reduced by 1. When a router receives a datagram with a TTL equal to 1, the router discards that datagram.

tunnel—A secured, virtual connection between two nodes on a VPN.

tunneling—The process of encapsulating one type of protocol in another. Tunneling is the way in which higher-layer data is transported over VPNs by Layer 2 protocols.

twinaxial cable—A type of cable that consists of two copper conductors at its center surrounded by an insulator, a braided metal shielding, called braiding, and an outer cover, called the sheath or jacket.

twist ratio—The number of twists per meter or foot in a twisted-pair cable.

twisted-pair—A type of cable similar to telephone wiring that consists of color-coded pairs of insulated copper wires, each with a diameter of 0.4 to 0.8 mm, twisted around each other and encased in plastic coating.

two-way transitive trust—The security relationship between domains in the same domain tree in which one domain grants every other domain in the tree access to its resources and, in turn, that domain can access other domains’ resources. When a new domain is added to a tree, it immediately shares a two-way trust with the other domains in the tree.

type 1 IBM connector—A type of Token Ring connector that uses interlocking tabs that snap into an identical connector when one is flipped upside-down, making for a secure connection. Type 1 IBM connectors are used on STP-based Token Ring networks.

typeful—A way of denoting an object’s context in which the organization and organizational unit designators (“O=“ and “OU=,” respectively) are included. For example, OU=Inv.OU=_Ops.OU=Corp. O=Sutkin.

Glossary 823

typeless—A way of denoting an object’s context in which the organization and organizational unit designators (“O=“ and “OU=,” respectively) are omitted. For example, Inv.Ops.Corp._Sutkin.

UDF (Universal Disk Format)—A file system used on CD-ROMs and DVD (digital video disc) media.

UDP (User Datagram Protocol)—A core protocol in the TCP/IP suite that sits in the Transport layer of the OSI Model. UDP is a connectionless transport service.

UFS—The primary file system used in the Solaris operating system.

unicast address—A type of IPv6 address that represents a single interface on a device. An IPv6 unicast address begins with either FFC0 or FF80.

uninterruptible power supply—See UPS.

Universal Disk Format—See UDF.

universal group—A group on a Windows Server 2003 network that allows members from one domain to access resources in multiple domains and forests.

unpopulated segment—A network segment that does not contain end nodes, such as workstations. Unpopulated segments are also called link segments.

unshielded twisted-pair—See UTP.

upgrade—A major change to the existing code in a software application, which may or may not be offered free from a vendor, and may or may not be comprehensive enough to substitute for the original application.

uplink—A connection from an earth-based transmitter to an orbiting satellite.

uplink port—A port on a connectivity device, such as a hub or switch, used to connect it to another connectivity device.

UPN (user principal name) suffix—The portion of a universal principal name (in Windows Server 2003 Active Directory’s naming conventions) that follows the @ sign.

UPN (user principal name)—The preferred Active Directory naming convention for objects when used in informal situations. This name looks like a familiar Internet address, including the positioning of the domain name after the @ sign. UPNs are typically used for e-mail and related Internet services.

UPS (uninterruptible power supply)—A battery-operated power source directly attached to one or more devices and to a power supply (such as a wall outlet), which prevents undesired features of the power source from harming the device or interrupting its services.

upstream—A term used to describe data traffic that flows from a customer’s site to a carrier’s facility. In asymmetrical communications, upstream throughput is usually much lower than downstream throughput. In symmetrical communications, upstream and downstream throughputs are equal.

USB (universal serial bus) port—A standard external bus that can be used to connect multiple types of peripherals, including modems, mice, and NICs, to a computer. Two USB standards exist: USB 1.1 and USB 2.0. Most modern computers support the USB 2.0 standard.

user—A person who uses a computer.

User Datagram Protocol—See UDP.

user principal name—See UPN.

824 Glossary

UTP (unshielded twisted-pair)—A type of cabling that consists of one or more insulated wire pairs encased in a plastic sheath. As its name implies, UTP does not contain additional shielding for the twisted pairs. As a result, UTP is both less expensive and less resistant to noise than STP.

vault—A large tape storage library.

virtual address—See network address.

virtual circuit—A connection between network nodes that, although based on potentially disparate physical links, logically appears to be a direct, dedicated link between those nodes.

virtual local area network—See VLAN.

virtual memory—The memory that is logically carved out of space on the hard disk and added to physical memory (RAM).

virtual private network—See VPN.

virus—A program that replicates itself to infect more computers, either through network connections or through floppy disks passed among users. Viruses may damage files or systems, or simply annoy users by flashing messages or pictures on the screen or by causing the keyboard to beep.

virus hoax—A rumor, or false alert, about a dangerous, new virus that could supposedly cause serious damage to your workstation.

VLAN (virtual local area network)—A network within a network that is logically defined by grouping its devices’ switch ports in the same broadcast domain. A VLAN can consist of any type of network node in any geographic location and can incorporate nodes connected to different switches.

Voice over IP (VoIP)—The provision of telephone service over a packet-switched network running the TCP/IP protocol suite. One form of VoIP (pronounced “voyp”) is Internet telephony, though VoIP is frequently used over private networks to circumvent long-distance toll charges.

VoIP – See voice over IP.

volt—The measurement used to describe the degree of pressure an electrical current exerts on a conductor.

voltage—The pressure (sometimes informally referred to as the strength) of an electrical current.

volt-amp (VA)—A measure of electrical power. A volt-amp is the product of the voltage and current (measured in amps) of the electricity on a line.

voltmeter—A device used to measure voltage (or electrical pressure) on an electrical _circuit.

VPN (virtual private network)—A logically constructed WAN that uses existing public transmission systems. VPNs can be created through the use of software or combined software and hardware solutions. This type of network allows an organization to carve out a private WAN through the Internet that serves only its offices, while keeping the data secure and isolated from other (public) traffic.

WAN (wide area network)—A network that spans a long distance and connects two or more LANs.

WAN link—A point-to-point connection between two nodes on a WAN.

WAP (wireless access point)—See AP.

war driving—The act of driving while running a laptop configured to detect and capture wireless data transmissions.

Glossary 825

warm site—A place where the computers, devices, and connectivity necessary to rebuild a network exist, though only some are appropriately configured, updated, or connected to match the network’s current state.

wavelength—The distance between corresponding points on a wave’s cycle. Wavelength is inversely proportional to frequency.

wavelength division multiplexing—See WDM.

WDM (wavelength division multiplexing)—A multiplexing technique in which each signal on a fiberoptic cable is assigned a different wavelength, which equates to its own subchannel. Each wavelength is modulated with a data signal. In this manner, multiple signals can be simultaneously transmitted in the same direction over a length of fiber.

Web portal—A secure, Web-based interface to an application or group of applications.

Web server—A computer that manages Web site services, such as supplying a Web page to multiple users on demand.

Webcasting—A broadcast transmission from one Internet-attached node to multiple other Internetattached nodes.

Well Known Ports—TCP/IP port numbers 0 to 1023, so named because they were long ago assigned by Internet authorities to popular services (for example, FTP and Telnet), and are therefore well known and frequently used.

WEP (Wired Equivalent Privacy)—A key encryption technique for wireless networks that uses keys both to authenticate network clients and to encrypt data in transit.

whois—The utility that allows you to query ICANN’s DNS registration database and find the information as a domain.

wide area network—See WAN.

Wi-Fi—See 802.11b.

Wi-Fi Alliance—An international, nonprofit organization dedicated to ensuring the interoperability of 802.11-capable devices.

Wi-Fi Protected Access—See WPA.

WiMAX—See 802.16a.

Windows Internet Naming Service—See WINS.

Windows Services for UNIX—A suite of applications designed to integrate Windows Server 2003 servers with UNIX-type of servers and clients. One application in this suite enables Windows and UNIX-type of servers to share directory information (when the UNIX-type of server has a directory installed). Another application enables UNIX-type of clients to view resources on a Windows Server 2003 server as if they were resources on a UNIX-type of server.

winipcfg—The TCP/IP configuration and management utility for use with Windows 9x and Me systems. Winipcfg differs from ipconfig in that it supplies a graphical user interface.

WINS (Windows Internet Naming Service)—A service that resolves NetBIOS names with IP addresses. WINS is used exclusively with systems that use NetBIOS—therefore, it is found on Win- dows-based systems.

826 Glossary

wire-bound—A type of signal that relies on a physical medium, such as a cable, for its transmission.

Wired Equivalent Privacy—See WEP.

wireless—The signals made of electromagnetic energy that travel through the atmosphere.

wireless access point—See WAP.

wireless broadband—The term used to describe the recently released standards for high-throughput, long-distance digital data exchange over wireless connections. WiMAX (IEEE 802.16a) is one example of a wireless broadband technology.

wireless LAN—See WLAN.

wireless personal area network—See WPAN.

wireless spectrum—A continuum of electromagnetic waves used for data and voice communication. The wireless spectrum (as defined by the FCC, which controls its use) spans frequencies between 9 KHz and 300 GHz. Each type of wireless service can be associated with one area of the wireless spectrum.

WLAN (wireless LAN)—A LAN that uses wireless connections for some or all of its transmissions.

workgroup—A group of interconnected computers that share each others’ resources without relying on a central file server.

workgroup hub—See standalone hub.

Workgroup Manager—The application in Mac OS X Server that enables a network administrator to manage users and groups.

workstation—A computer that runs a desktop operating system and connects to a network.

Worldwide Interoperability for Microwave Access (WiMAX)—See 802.16a.

worm—An unwanted program that travels between computers and across networks. Although worms do not alter other programs as viruses do, they may carry viruses.

WPA (Wi-Fi Protected Access)—A wireless security method endorsed by the Wi-Fi Alliance that is considered a subset of the 802.11i standard. In WPA, authentication follows the same mechanism specified in 802.11i. The main difference between WPA and 802.11i is that WPA specifies RC4 encryption rather than AES.

WPA2—The name given to the 802.11i security standard by the Wi-Fi Alliance. The only difference between WPA2 and 802.11i is that WPA2 includes support for the older WPA security method.

WPAN (wireless personal area network)—A small office or home network in which devices such as mobile telephones, PDAs, laptops, and computers are connected via wireless transmission.

X Server—A NetWare 6.x server’s graphical desktop. X Server loads by default when the server starts.

X Window system—The GUI environment for UNIX-type of systems.

X.25—An analog, packet-switched WAN technology optimized for reliable, long-distance data transmission and standardized by the ITU in the mid-1970s. The X.25 standard specifies protocols at the Physical, Data Link, and Network layers of the OSI Model. It provides excellent flow control and ensures data reliability over long distances by verifying the transmission at every node. X.25 can support a maximum of only 2-Mbps throughput.

Glossary 827

xDSL—The term used to refer to all varieties of DSL.

XNU—The Mach-based kernel in Mac OS X.

Xserve—The enterprise-class of server computer by Apple Computer, which is based on the PowerPC processor and which runs Mac OS X Server.

Zeroconf (Zero Configuration)—A collection of protocols designed by the IETF to simplify the setup of nodes on a TCP/IP network. Zeroconf assigns a node an IP address, resolves the node’s host name and IP address without requiring a DNS server, and discovers services, such as print services, available to the node, also without requiring a DNS server.

This page intentionally left blank

Index

A

Active Directory, 384–392, 405, 460 active monitor, 265–266, 283 active scanning, 271–272, 283 active topology, 248, 283

ACT light, 209 adapter card, 512

address, definition of, 24 addressing, 12

See also specific types of addressing definition of, 24

in IPv6, 160–161

in IPX/SPX, 175–176 in NetBEUI, 177

in TCP/IP, 148–152 address management, 16, 24

Address Resolution Protocol (ARP), 146–147, 183 address resource record, 183

ad-hoc WLAN, 115–116, 122 administrative tools, 384 Administrator account, 399, 406 administrator password, 465

AES (Advanced Encryption Standard), 638, 656 AFP (AppleTalk Filing Protocol), 361, 406 agent, 700

AH (authentication header), 644, 656–657 airwaves, 109

AIX, 444 alias, 164, 183

AM (amplitude modulation), 69, 122

American National Standards Institute (ANSI), 33, 54

amplifiers, 78, 122 amplitude, 122

amplitude modulation (AM), 69, 122 analog signals, 64–69, 122, 512 analysts, help desk, 543

analyzer, network and protocol, 554–556 ANDing, 485, 517

ANSI (American National Standards Institute), 33, 54

antennas, 110–111 Antitrust law, 416 antivirus policies, 574–575

antivirus software, 572–574, 603 anycast address, 161, 183

API (application program interface), 54

APIPA (Automatic Private IP Addressing), 157–158 Apple Computers, 418

AppleShare IP, 444 AppleTalk, 178–179, 183

AppleTalk Filing Protocol (AFP), 361, 406 AppleTalk network number, 179, 183 AppleTalk node ID, 178, 183

AppleTalk zones, 178, 183 application gateway, 631, 656 Application layer, 356

definition of, 54 in OSI Model, 48 protocols, 37

Application layer gateway, 631, 656–657 application processing, 359

application program interface (API ), 54 application switches, 237. See also higher-layer

switches

application upgrades, 688, 699 applications, 368–370, 455 apropos command, 427

APs (access points), 556–557 archive bit, 599, 606

ARP (Address Resolution Protocol), 146–147, 183 ARP table, 147, 184, 188

arrays, 587, 606

AS (authentication service), 650, 657 ascii command, 170

asset management, 16, 24, 683–684, 698, 700 assigning IP addresses, 152–158 associations, 21–22, 271–273, 283

830 Index

-a switch, 174

for ifconfig, 510 for nbtstat, 504 for netstat, 502

asymmetric encryption (public key encryption), 640, 657

asymmetric multiprocessing, 375, 406 asymmetrical, 312, 342

asymmetrical DSL, 312, 343 asynchronous, 343

ATM (Asynchronous Transfer Mode), 268–270, 283 attended installation, 396

attenuation, 551 definition of, 123 transmission flaw, 78–79

in wireless signals, 112–113 attributes, 365, 406

audits, security, 616–617 authentication, 329, 343

authentication header (AH), 644, 656–657 authentication protocols, 644–651, 656–657

CHAP and MS-CHAP, 646–648

EAP (Extensible Authentication Protocol), 649 PAP (Password Authentication Protocol), 646 RADIUS and TACACS, 645

authentication service (AS), 650, 657 authenticator, 650, 657

Automatic Private IP Addressing (APIPA ), 157–158 availability, 606

B

backbone networks, 252–256 collapsed backbone, 254–255 distributed backbone, 253–254 parallel backbone, 255–256 serial backbone, 252–253 upgrades, 696–697, 700

back doors, 620

backleveling (reversing software upgrades), 691–692, 699–700

backups, 16, 605

backup media and methods, 595–598 data backup, 594–600

definition of, 24 differential backup, 607

full backup, 599, 608 network, 598

online backups, 609

rotation scheme, 599, 605–606 tape, 596–597

tape backups, 611 verification, 600 bandwidth, 74–76, 123 baseband, 76–77, 123

base I/O port setting, 212 baseline, 552, 560

baseline measurements, 678–680 baselining, 698

base schema, 461, 477

basic input/output system (BIOS), 211, 237 Basic Rate Interface (BRI), 305, 343

B channel, 305, 343 beacon frame, 272, 283 Bell Labs, 416

bend radius, 123

Berkeley Software Distribution (BSD), 417, 444 best path, 231, 237

BGP (Border Gateway Protocol), 232, 237 bidirectional transmission. See full-duplex transmis-

sion binary, 482, 484

definition of, 123

and dotted decimal notation, 151 binary command, 171

binary digit (bit), 75–76, 123 binding, 184

binding protocols, 179–180 bio-recognition access, 626, 657

BIOS (basic input/output system), 211, 237 bit (binary digit), 75–76, 123

blackouts, 576–577, 606 Block ID, 46–47, 54 blocking ports, 629 Bluetooth, 283

Bluetooth Special Interest Group (SIG), 275–277, 283

bonding, 305, 343 boot disks, 568

boot partition, 458, 477 boot sector viruses, 569, 606

BOOTP (Bootstrap Protocol), 153–154, 184

Border Gateway Protocol (BGP), 232, 237 border routers, 229, 237

BorderManager, 456, 477 bots, 571, 606

braiding, 83, 123 branch objects, 463 branches, 367, 406

BRI (Basic Rate Interface), 305, 343 bridge router, 237

bridges, 218–221, 237 broadband, 76–77, 113 broadband cable, 316–318, 343 broadcast address, 486 broadcast domain, 225, 237 broadcast transmission, 74, 123 brouter, 237

brownouts (sags), 576–577, 606, 610 browser-based access, 474

brute force attack, 636, 657

BSD (Berkeley Software Distribution), 417, 444 bugs, 687, 700

bus, 195, 237, 283

bus standards, 195–198, 198–201 bus topology, 246–248, 284

bus topology WAN, 294–295, 343 bytes, 75–76

converting decimal number to, 68 definition of, 123

C

cable checkers. See continuity tester cable continuity testers, 549–550, 556 cable drop, 343

cable modem, 123, 316, 343

cable performance testers, 551, 560 cable plant, 123

cables

See also specific types of cables cost of, 80–81

crossover, 546

design and management, 100–104 installation, 104–108

upgrades, 695–696, 700 calculating subnets, 488–491

call tracking system, 543–544, 560

Index 831

capacity. See bandwidth; throughput CardBus standard, 198, 237

career centers, 20 career fairs, 21

Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA), 271, 284

Carrier Sense Multiple Access with Collision Detection (CSMA/CD), 259–261, 271, 284

Category 3 (CAT 3), 87, 123

Category 4 (CAT 4), 88, 124

Category 5 (CAT 5), 88, 124

Category 6 (CAT 6), 89, 124

Category 7 (CAT 7), 89, 124 cat file command, 428 C-band frequency, 325

cd command, 171

cd /d1/d2/d3 command, 428

CDFS (CD-ROM File System), 381, 406 CD-R (compact disc-recordable), 596, 606 CD-ROM component

for Linux server, 422–423 for Mac OS X Server, 423 for Solaris 10, 422

CD-ROM drive, requirements for Windows Server 2003, 378

CD-ROM File System (CDFS), 381, 406 CD-RW (compact disc-rewriteable), 596, 606 cell, 284

central office, 299–300, 343 certification, 19–20, 24

Certified NetWare Engineers (CNEs), 19, 24, 454 challenge, 646, 657

Challenge Handshake Authentication Protocol (CHAP), 646–648, 657

change management systems, 544–545, 561, 567 changes, scope of, 537–538

channel, 71, 124

channel service unit (CSU), 344

channel service unit/data service unit (CSU/DSU), 310–311, 344

CHAP (Challenge Handshake Authentication Protocol), 646–648, 657

checksum, 40, 54, 139, 144 chgrp group file command, 429 child domains, 388, 406 chmod command, 438

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]