Network+ 2005 In Depth (P29) pps

30 342 0
Network+ 2005 In Depth (P29) pps

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

812 Glossary Secure Sockets Layer—See SSL. security audit—An assessment of an organization’s security vulnerabilities. A security audit should be performed at least annually and preferably quarterly—or sooner if the network has undergone significant changes. For each risk found, it should rate the severity of a potential breach, as well as its likelihood. security policy—A document or plan that identifies an organization’s security goals, risks, levels of authority, designated security coordinator and team members, responsibilities for each team member, and responsibilities for each employee. In addition, it specifies how to address security breaches. segment—A part of a network. Usually, a segment is composed of a group of nodes that share the same communications channel for all their traffic. segmentation—The process of decreasing the size of data units when moving data from a network that can handle larger data units to a network that can handle only smaller data units. self-healing—A characteristic of dual-ring topologies that allows them to automatically reroute traffic along the backup ring if the primary ring becomes severed. Sequenced Packet Exchange—See SPX. sequencing—The process of assigning a placeholder to each piece of a data block to allow the receiving node’s Transport layer to reassemble the data in the correct order. serial backbone—A type of backbone that consists of two or more internetworking devices connected to each other by a single cable in a daisy-chain fashion. Hubs are often connected in this way to extend a network. Serial Line Internet Protocol—See SLIP. server—A computer on the network that manages shared resources. Servers usually have more process- ing power, memory, and hard disk space than clients. They run network operating software that can man- age not only data, but also users, groups, security, and applications on the network. Server Message Block—See SMB. server mirroring—A fault-tolerance technique in which one server duplicates the transactions and data storage of another, identical server. Server mirroring requires a link between the servers and software run- ning on both servers so that the servers can continually synchronize their actions and one can take over in case the other fails. server_hello—In the context of SSL encryption, a message issued from the server to the client that con- firms the information the server received in the client_hello message. It also agrees to certain terms of encryption based on the options the client supplied. Depending on the Web server’s preferred encryption method, the server may choose to issue your browser a public key or a digital certificate at this time. service pack—A significant patch to one of the Microsoft Windows operating systems. Service Set Identifier—See SSID. session—A connection for data exchange between two parties. The term “session” may be used in the context of Web, remote access, or terminal and mainframe communications, for example. session key—In the context of Kerberos authentication, a key issued to both the client and the server by the authentication service that uniquely identifies their session. Glossary 813 Session layer—The fifth layer in the OSI Model. The Session layer establishes and maintains commu- nication between two nodes on the network. It can be considered the “traffic cop” for network commu- nications. SFD (start-of-frame delimiter)—A 1-byte field that indicates where the data field begins in an Ether- net frame. SFTP (Secure File Transfer Protocol)—A protocol available with the proprietary version of SSH that copies files between hosts securely. Like FTP, SFTP first establishes a connection with a host and then allows a remote user to browse directories, list files, and copy files. Unlike FTP, SFTP encrypts data before transmitting it. shared Ethernet—A version of Ethernet in which all the nodes share a common channel and a fixed amount of bandwidth. sheath—The outer cover, or jacket, of a cable. shell—Another term for the UNIX command interpreter. shielded twisted-pair—See STP. signal bounce—A phenomenon, caused by improper termination on a bus-topology network, in which signals travel endlessly between the two ends of the network, preventing new signals from getting through. signal level—An ANSI standard for T-carrier technology that refers to its Physical layer electrical sig- naling characteristics. DS0 is the equivalent of one data or voice channel. All other signal levels are mul- tiples of DS0. signature scanning—The comparison of a file’s content with known virus signatures (unique identify- ing characteristics in the code) in a signature database to determine whether the file is a virus. Simple Mail Transfer Protocol—See SMTP. Simple Network Management Protocol—See SNMP. simplex—A type of transmission in which signals may travel in only one direction over a medium. single point of failure—A device or connection on a network that, were it to fail, could cause the entire network to stop functioning. single-mode fiber—See SMF. site license—A type of software license that, for a fixed price, allows any number of users in one loca- tion to legally access a program. site selection—The process of determining optimal locations for access points on a wireless network. slash notation—See CIDR notation. SLIP (Serial Line Internet Protocol)—A communications protocol that enables a workstation to con- nect to a server using a serial connection. SLIP can support only asynchronous communications and IP traffic, and requires some configuration on the client workstation. SLIP has been made obsolete by PPP. SMB (Server Message Block)—A protocol for communications and resource access between systems, such as clients and servers. SMB originated at IBM and then was adopted and further developed by 814 Glossary Microsoft for use on its Windows operating systems. The current version of SMB is known as the CIFS (Common Internet File System) protocol. SMF (single-mode fiber)—A type of fiber-optic cable with a narrow core that carries light pulses along a single path data from one end of the cable to the other end. Data can be transmitted faster and for longer distances on single-mode fiber than on multimode fiber. However, single-mode fiber is more expensive. SMTP (Simple Mail Transfer Protocol)—The Application layer TCP/IP subprotocol responsible for moving messages from one e-mail server to another. snap-in—An administrative tool, such as Computer Management, that can be added to the MMC (Microsoft Management Console). sneakernet—A way of exchanging data between computers that are not connected on a network. Sneak- ernet requires that data be copied from a computer to a removable storage device such as a floppy disk, carried (presumably by someone wearing sneakers) to another computer, then copied from the storage device onto the second computer. SNMP (Simple Network Management Protocol)—An Application layer protocol in the TCP/IP suite used to convey data regarding the status of managed devices on a network. social engineering—The act of manipulating personal relationships to circumvent network security measures and gain access to a system. socket—A logical address assigned to a specific process running on a computer. Some sockets are reserved for operating system functions. soft skills—The skills such as customer relations, leadership ability, and dependability, which are not eas- ily measured, but are nevertheless important in a networking career. softphone—A computer programmed to act like an IP telephone. Softphones present the caller with a graphical representation of a telephone dial pad and can connect to a network via a LAN, WAN, PPP dial-up connection, or leased line. software distribution—The process of automatically transferring a data file or installing a software application from the server to a client on the network. software RAID—A method of implementing RAID that uses software to implement and control RAID techniques over virtually any type of hard disk(s). RAID software may be a third-party package or utili- ties that come with an operating system NOS. SOHO (small office-home office) router—A router designed for use on small office or home office net- works. SOHO routers typically have no more than eight data ports and do not offer advanced features such as traffic prioritization, network management, or hardware redundancy. Solaris—A proprietary implementation of the UNIX operating system by Sun Microsystems. SONET (Synchronous Optical Network)—A high-bandwidth WAN signaling technique that speci- fies framing and multiplexing techniques at the Physical layer of the OSI Model. It can integrate many other WAN technologies (for example, T-carriers, ISDN, and ATM technology) and allows for simple link additions and removals. SONET’s topology includes a double ring of fiber-optic cable, which results in very high fault tolerance. Glossary 815 source code—The computer instructions written in a programming language that is readable by humans. Source code must be translated into a form that is executable by the machine, typically called binary code (for the sequence of zeros and ones) or target code. spam—An unsolicited, unwanted e-mail. SPARC—The brand of computer central processing unit invented by and used in Sun Microsystems servers. spectrum analyzer—A tool that assesses the characteristics (for example, frequency, amplitude, and the effects of interference) of wireless signals. sponsor—A person in a position of authority who supports a project and who can lobby for budget increases necessary to complete the project, appeal to a group of managers to extend a project’s deadline, and assist with negotiating vendor contracts. spread spectrum—A type of wireless transmission in which lower-level signals are distributed over sev- eral frequencies simultaneously. Spread spectrum transmission is more secure than narrowband. SPX (Sequenced Packet Exchange)—One of the core protocols in the IPX/SPX suite. SPX belongs to the Transport layer of the OSI Model and works in tandem with IPX to ensure that data are received whole, in sequence, and error free. SSH (Secure Shell)—A connection utility that provides authentication and encryption. With SSH, you can securely log on to a host, execute commands on that host, and copy files to or from that host. SSH encrypts data exchanged throughout the session. SSID (Service Set Identifier)—A unique character string used to identify an access point on an 802.11 network. SSL (Secure Sockets Layer)—A method of encrypting TCP/IP transmissions—including Web pages and data entered into Web forms—en route between the client and server using public key encryption technology. SSL session—In the context of SSL encryption, an association between the client and server that is defined by an agreement on a specific set of encryption techniques. An SSL session allows the client and server to continue to exchange data securely as long as the client is still connected to the server. SSL ses- sions are established by the SSL handshake protocol. ST (Straight Tip)—A connector used with single-mode or multimode fiber-optic cable. stackable hub—A type of hub designed to be linked with other hubs in a single telecommunications closet. Stackable hubs linked together logically represent one large hub to the network. stakeholder—Any person who may be affected by a project, for better or for worse. A stakeholder may be a project participant, user, manager, or vendor. standalone computer—A computer that uses applications and data only from its local disks and that is not connected to a network. standalone hub—A type of hub that serves a workgroup of computers that are separate from the rest of the network, also known as a workgroup hub. standard—A documented agreement containing technical specifications or other precise criteria that are used as guidelines to ensure that materials, products, processes, and services suit their intended purpose. 816 Glossary Standard Connector—See SC. standby UPS—A power supply that provides continuous voltage to a device by switching virtually instantaneously to the battery when it detects a loss of power from the wall outlet. Upon restoration of the power, the standby UPS switches the device to use A/C power again. star topology—A physical topology in which every node on the network is connected through a central device, such as a hub. Any single physical wire on a star network connects only two devices, so a cabling problem will affect only two nodes. Nodes transmit data to the hub, which then retransmits the data to the rest of the network segment where the destination node can pick it up. star topology WAN—A type of WAN in which a single site acts as the central connection point for sev- eral other points. This arrangement provides separate routes for data between any two sites; however, if the central connection point fails, the entire WAN fails. start-of-frame delimiter (SFD)—See SFD. star-wired bus topology—A hybrid topology in which groups of workstations are connected in a star fashion to hubs that are networked via a single bus. star-wired ring topology—A hybrid topology that uses the physical layout of a star and the token-pass- ing data transmission method. static ARP table entry—A record in an ARP table that someone has manually entered using the ARP utility. Static ARP table entries remain the same until someone manually modifies them with the ARP utility. static IP address—An IP address that is manually assigned to a device and remains constant until it is manually changed. static routing—A technique in which a network administrator programs a router to use specific paths between nodes. Because it does not account for occasional network congestion, failed connections, or device moves, static routing is not optimal. station—An end node on a network; used most often in the context of wireless networks. statistical multiplexing—A method of multiplexing in which each node on a network is assigned a sep- arate time slot for transmission, based on the node’s priority and need. stealth virus—A type of virus that hides itself to prevent detection. Typically, stealth viruses disguise themselves as legitimate programs or replace part of a legitimate program’s code with their destructive code. storage area network—See SAN. store and forward mode—A method of switching in which a switch reads the entire data frame into its memory and checks it for accuracy before transmitting it. Although this method is more time-consum- ing than the cut-through method, it allows store and forward switches to transmit data more accurately. STP (shielded twisted-pair)—A type of cable containing twisted-wire pairs that are not only individu- ally insulated, but also surrounded by a shielding made of a metallic substance such as foil. Straight Tip—See ST. straight-through cable—A twisted-pair patch cable in which the wire terminations in both connectors follow the same scheme. Glossary 817 structured cabling—A method for uniform, enterprise-wide, multivendor cabling systems specified by the TIA/EIA 568 Commercial Building Wiring Standard. Structured cabling is based on a hierarchical design using a high-speed backbone. subchannel—One of many distinct communication paths established when a channel is multiplexed or modulated. subnet—A part of a network in which all nodes shares a network addressing component and a fixed amount of bandwidth. subnet mask—A 32-bit number that, when combined with a device’s IP address, indicates what kind of subnet the device belongs to. subnetting—The process of subdividing a single class of network into multiple, smaller networks. subprotocols—Small, specialized protocols that work together and belong to a protocol suite. Subscriber Connector—See SC. supernet—A type of subnet that is created using bits that normally would be reserved for network class information—by moving the subnet boundary to the left. supernet mask—A 32-bit number that, when combined with a device’s IP address, indicates the kind of supernet to which the device belongs. supernetting—See CIDR. supported services list—A document that lists every service and software package supported within an organization, plus the names of first- and second-level support contacts for those services or software packages. surge—A momentary increase in voltage due to distant lightning strikes or electrical problems. surge protector—A device that directs excess voltage away from equipment plugged into it and redirects it to a ground, thereby protecting the equipment from harm. SVC (switched virtual circuit)—A logical, point-to-point connections that relies on switches to deter- mine the optimal path between sender and receiver. ATM technology uses SVCs. swap file—See page file. switch—A connectivity device that logically subdivides a network into smaller, individual collision domains. A switch operates at the Data Link layer of the OSI Model and can interpret MAC address information to determine whether to filter (discard) or forward packets it receives. switch—The letters or words added to a command that allow you to customize a utility’s output. Switches are usually preceded by a hyphen or forward slash character. switched Ethernet—An Ethernet model that enables multiple nodes to simultaneously transmit and receive data and individually take advantage of more bandwidth because they are assigned separate logi- cal network segments through switching. switched virtual circuit—See SVC. switching—A component of a network’s logical topology that manages how packets are filtered and for- warded between nodes on the network. 818 Glossary symmetric encryption—A method of encryption that requires the same key to encode the data as is used to decode the ciphertext. symmetric multiprocessing—A method of multiprocessing that splits all operations equally among two or more processors. Windows Server 2003 supports this type of multiprocessing. symmetrical—A characteristic of transmission technology that provides equal throughput for data trav- eling both upstream and downstream and is suited to users who both upload and download significant amounts of data. symmetrical DSL—A variation of DSL that provides equal throughput both upstream and downstream between the customer and the carrier. SYN (synchronization)—The packet one node sends to request a connection with another node on the network. The SYN packet is the first of three in the three-step process of establishing a connection. SYN-ACK (synchronization-acknowledgment)—The packet a node sends to acknowledge to another node that it has received a SYN request for connection. The SYN-ACK packet is the second of three in the three-step process of establishing a connection. synchronization—See SYN. synchronization-acknowledgement—See SYN-ACK. synchronous—A transmission method in which data being transmitted and received by nodes must con- form to a timing scheme. Synchronous Digital Hierarchy—See SDH. Synchronous Optical Network—See SONET. system bus—See bus. System V—The proprietary version of UNIX that comes from Bell Labs. T1—A digital carrier standard used in North America and most of Asia that provides 1.544-Mbps throughput and 24 channels for voice, data, video, or audio signals. T1s rely on time division multiplex- ing and may use shielded or unshielded twisted-pair, coaxial cable, fiber-optic, or microwave links. T3—A digital carrier standard used in North America and most of Asia that can carry the equivalent of 672 channels for voice, data, video, or audio, with a maximum data throughput of 44.736 Mbps (typi- cally rounded up to 45 Mbps for purposes of discussion). T3s rely on time division multiplexing and require either fiber-optic or microwave transmission media. TA (terminal adapter)—A device used to convert digital signals into analog signals for use with ISDN phones and other analog devices. TAs are sometimes called ISDN modems. TACACS (Terminal Access Controller Access Control System)—A centralized authentication system for remote access servers that is similar to, but older than, RADIUS. tape backup—A relatively simple and economical backup method in which data is copied to magnetic tapes. T-carrier—The term for any kind of leased line that follows the standards for T1s, fractional T1s, T1Cs, T2s, T3s, or T4s. Glossary 819 TCP (Transmission Control Protocol)—A core protocol of the TCP/IP suite. TCP belongs to the Transport layer and provides reliable data delivery services. TCP/IP (Transmission Control Protocol/Internet Protocol)—A suite of networking protocols that includes TCP, IP, UDP, and many others. TCP/IP provides the foundation for _data exchange across the Internet. TCP/IP core protocols—The major subprotocols of the TCP/IP suite, including IP, TCP, and UDP. TDM (time division multiplexing)—A method of multiplexing that assigns a time slot in the flow of communications to every node on the network and, in that time slot, carries data from that node. TDR (time domain reflectometer)—A high-end instrument for testing the qualities of a cable. It works by issuing a signal on a cable and measuring the way in which the signal bounces back (or reflects) to the TDR. Many performance testers rely on TDRs. TE (terminal equipment)—The end nodes (such as computers and printers) served by the same con- nection (such as an ISDN, DSL, or T1 link). Telecommunications Industry Association—See TIA. Telnet—A terminal emulation protocol used to log on to remote hosts using the TCP/IP protocol. Tel- net resides in the Application layer of the OSI Model. terminal—A device with little (if any) of its own processing or disk capacity that depends on a host to supply it with applications and data-processing services. Terminal Access Controller Access Control System—See TAC A CS. terminal adapter—See TA . terminal equipment—See TE. terminal server—A computer that runs specialized software to act as a host and supply applications and resource sharing to remote clients. terminal services—A remote access method in which a terminal server acts as a host for multiple remote clients. Terminal services requires specialized software on both the client and server. After connecting and authenticating, a client can access applications and data just as if it were directly attached to the LAN. Terminal Services—The Microsoft software that enables a server to supply centralized and secure net- work connectivity to remote clients. terminator—A resistor that is attached to each end of a bus-topology network and that causes the sig- nal to stop rather than reflect back toward its source. TFTP (Trivial File Transfer Protocol)—A TCP/IP Application layer protocol that enables file trans- fers between computers. Unlike FTP, TFTP relies on UDP at the Transport layer and does not require a user to log on to the remote host. TGS (Ticket-granting service)—In Kerberos terminology, an application that runs on the KDC that issues ticket-granting tickets to clients so that they need not request a new ticket for each new service they want to access. TGT (ticket-granting ticket)—In Kerberos terminology, a ticket that enables a user to be accepted as a validated principal by multiple services. 820 Glossary The Open Group—A nonprofit industry association that owns the UNIX trademark. The SCO Group—The company that owns the rights to the UNIX source code. Thicknet—An IEEE Physical layer standard for achieving a maximum of 10-Mbps throughput over coaxial copper cable. Thicknet is also known as 10BASE-5. Its maximum segment length is 500 meters, and it relies on a bus topology. thickwire Ethernet—See Thicknet. thin client—A client that relies on another host for the majority of processing and hard disk resources necessary to run applications and share files over the network. thin Ethernet—See Thinnet. Thinnet—An IEEE Physical layer standard for achieving 10-Mbps throughput over coaxial copper cable. Thinnet is also known as10BASE-2. Its maximum segment length is 185 meters, and it relies on a bus topology. thread—A well-defined, self-contained subset of a process. Using threads within a process enables a pro- gram to efficiently perform related, multiple, simultaneous activities. Threads are also used to enable processes to use multiple processors on SMP systems. three-way handshake—An authentication process that involves three steps. throughput—The amount of data that a medium can transmit during a given period of time. Through- put is usually measured in megabits (1,000,000 bits) per second, or Mbps. The physical nature of every transmission media determines its potential throughput. TIA (Telecommunications Industry Association)—A subgroup of the EIA that focuses on standards for information technology, wireless, satellite, fiber optics, and telephone equipment. Probably the best known standards to come from the TIA/EIA alliance are its guidelines for how network cable should be installed in commercial buildings, known as the “TIA/EIA 568-B Series.” ticket—In Kerberos terminology, a temporary set of credentials that a client uses to prove that its iden- tity has been validated by the authentication service. Ticket-granting service—See TGS. ticket-granting ticket—See TGT. tiered topology WAN—A type of WAN in which sites that are connected in star or ring formations are interconnected at different levels, with the interconnection points being organized into layers to form hierarchical groupings. time division multiplexing—See TDM. time domain reflectometer—See TDR. Time to Live—See TTL. time-dependent virus—A virus programmed to activate on a particular date. This type of virus, also known as a “time bomb,” can remain dormant and harmless until its activation date arrives. time-sharing—See preemptive multitasking. TLD (top-level domain)—The highest-level category used to distinguish domain names—for example, .org, .com, .net. A TLD is also known as the domain suffix. Glossary 821 TLS (Transport Layer Security)—A version of SSL being standardized by the IETF (Internet Engi- neering Task Force). With TLS, IETF aims to create a version of SSL that encrypts UDP as well as TCP transmissions. TLS, which is supported by new Web browsers, uses slightly different encryption algo- rithms than SSL, but otherwise is very similar to the most recent version of SSL. token—A special control frame that indicates to the rest of the network that a particular node has the right to transmit data. token passing—A means of data transmission in which a 3-byte packet, called a token, is passed around the network in a round-robin fashion. Token Ring—A networking technology developed by IBM in the 1980s. It relies upon direct links between nodes and a ring topology, using tokens to allow nodes to transmit data. toll bypass—A cost-savings benefit that results from organizations completing long-distance telephone calls over their packet-switched networks, thus bypassing tolls charged by common carriers on compara- ble PSTN calls. tone generator—A small electronic device that issues a signal on a wire pair. When used in conjunction with a tone locator, it can help locate the termination of a wire pair. tone locator—A small electronic device that emits a tone when it detects electrical activity on a wire pair. When used in conjunction with a tone generator, it can help locate the termination of a wire pair. top-level domain—See TLD. topology—The physical layout of computers on a network. traceroute (tracert)—A TCP/IP troubleshooting utility that uses ICMP to trace the path from one net- worked node to another, identifying all intermediate hops between the two nodes. Traceroute is useful for determining router or subnet connectivity problems. On Windows-based systems, the utility is known as tracert. traffic—The data transmission and processing activity taking place on a computer network at any given time. traffic monitoring—The process of determining how much data transfer activity is taking place on a net- work or network segment and notifying administrators when a segment becomes overloaded. transceiver—A device that transmits and receives signals. transmission—In networking, the application of data signals to a medium or the progress of data signals over a medium from one point to another. Transmission Control Protocol/Internet Protocol—See TCP/IP. Transmission Control Protocol—See TCP. transmission media—The means through which data are transmitted and received. Transmission media may be physical, such as wire or cable, or atmospheric (wireless), such as radio waves. transmit—To issue signals to the network medium. transponder—The equipment on a satellite that receives an uplinked signal from earth, amplifies the sig- nal, modifies its frequency, then retransmits it (in a downlink) to an antenna on earth. Transport Layer Security—See TLS. [...]... universal principal name (in Windows Server 2003 Active Directory’s naming conventions) that follows the @ sign UPN (user principal name)—The preferred Active Directory naming convention for objects when used in informal situations This name looks like a familiar Internet address, including the positioning of the domain name after the @ sign UPNs are typically used for e-mail and related Internet services... (IPX/SPX), 175–176, 186 internetworking, network operating systems (NOS), 402–403 interoperability, 402 interrupt request (IRQ), 209–211, 240 interviewing users, 671–672 intranets, 497 definition, 519 security policies, 498 for TCP/IP-based networks, 497–498 intraNetWare, 452, 477 IP address (Internet Protocol address), 35, 43, 56, 142–146, 148 assigning, 152–158 classful addressing, 483 definition of, 56 dynamic,... system, 626 Electronic Industries Alliance (EIA), 33, 55 elements, organizing, 365–368 e-mail gateway, 233 e-mail security, 641 embossing, 538 EMI (electromagnetic interference), 77, 125 employment, 16–22 developing soft skills, 18–19 finding work in, 20–21 joining professional associations, 21–22 mastering technical challenges, 17–18 pursuing certification, 19–20 Encapsulating Security Payload (ESP),... full-duplex transmission binary, 482, 484 definition of, 123 and dotted decimal notation, 151 binary command, 171 binary digit (bit), 75–76, 123 binding, 184 binding protocols, 179–180 bio-recognition access, 626, 657 BIOS (basic input/output system), 211, 237 bit (binary digit), 75–76, 123 blackouts, 576–577, 606 Block ID, 46–47, 54 blocking ports, 629 Bluetooth, 283 Bluetooth Special Interest Group (SIG),... types of components CompTIA (Computing Technology Industry Association), 19, 25, 705 computer viruses, 572 conduit, 125 confidential information, 624 configuration for DNS, 166–168 for Fedora Core, 433–434 and installing NIC hardware, 203–205 and installing NIC software, 205–213 and installing Windows Server 2003, 395–402 for NetWare network operating system, 466–471 for Windows Server 2003, 397–399 connection... meter or foot in a twisted-pair cable twisted-pair—A type of cable similar to telephone wiring that consists of color-coded pairs of insulated copper wires, each with a diameter of 0.4 to 0.8 mm, twisted around each other and encased in plastic coating two-way transitive trust—The security relationship between domains in the same domain tree in which one domain grants every other domain in the tree access... assessing needs, 671–672 determining project feasibility, 670 project planning, 673 setting project goals, 672–673 testing and evaluation, 677–678 software changes, 684–692 client upgrades, 687–688 network operating system upgrades, 689–691 patches, 685–687 reversing software upgrade, 691–692 shared application upgrades, 688 Incident Report Form, 745 incremental backup, 599, 608 Independent Computing... NetWare network operating system, 466–471 planning of NetWare network operating system, 464–466 Windows Server 2003, 392–395 switches, 222–224 Windows Server 2003, 395–402 INSTALL program, 467 Institute of Electrical and Electronics Engineers (IEEE), 34, 51–52, 56 Integrated Kernel, NetWare network operating system, 456–458 Integrated Services Digital Network (ISDN), 302–305, 305–307, 346 integrity and availability,... 56 Internet Connection Sharing (ICS), 496–497, 518 Internet Control Message Protocol (ICMP), 146, 185 Internet Corporation for Assigned Names and Numbers (ICANN), 35–36, 56, 506 Internet Engineering Task Force (IETF), 35, 56, 491 Internet gateways, 233, 493–494, 538 Internet Group Management Protocol (IGMP), 146, 185 Internet Header Length (IHL), 143, 143–144 Internet Key Exchange (IKE), 644, 659 Internet... encrypt data in transit whois—The utility that allows you to query ICANN’s DNS registration database and find the information as a domain wide area network—See WAN Wi-Fi—See 802.11b Wi-Fi Alliance—An international, nonprofit organization dedicated to ensuring the interoperability of 802.11-capable devices Wi-Fi Protected Access—See WPA WiMAX—See 802.16a Windows Internet Naming Service—See WINS Windows Services . domains in the same domain tree in which one domain grants every other domain in the tree access to its resources and, in turn, that domain can access other domains’ resources. When a new domain. around the network in a round-robin fashion. Token Ring—A networking technology developed by IBM in the 1980s. It relies upon direct links between nodes and a ring topology, using tokens to allow. preferred Active Directory naming convention for objects when used in informal situations. This name looks like a familiar Internet address, including the positioning of the domain name after the @ sign.

Ngày đăng: 07/07/2014, 09:20

Từ khóa liên quan

Tài liệu cùng người dùng

Tài liệu liên quan