Definitions Flashcards
TCP/IP
Transmission Control Protocol/Internet Protocol
TCP/IP is a set of rules (protocols) governing communications among all computers on the Internet. More specifically, TCP/IP dictates how information should be packaged (turned into bundles of information called packets), sent, and received, and how to get to its destination.
DHCP
Dynamic Host Configuration Protocol
DHCP is a protocol used to assign an IP address to a computer or device connected to a network automatically. Routers, switches, or servers that use DHCP to assign addresses to other computers can make setup and management easier for the network administrator.
On a home network, DHCP can be set up by purchasing a home router, wireless router, or switch with NAT/DHCP and connecting each computer to it. If the network has a firewall, ports 67 and 68 need to be open for devices to function properly.
DNS
Domain Name System
Stands for “Domain Name System.” Domain names serve as memorizable names for websites and other services on the Internet. However, computers access Internet devices by their IP addresses. DNS translates domain names into IP addresses, allowing you to access an Internet location by its domain name.
DNS is a service that receives a request containing a domain name hostname and responds with the corresponding IP address.
UDP
User Datagram Protocol and defined in RFC 768, UDP is a network communications protocol. Also called UDP/IP, it is an alternative to TCP/IP that sacrifices reliability for speed and simplicity.
Like TCP, UDP transfers packets using IP (Internet Protocol). However, it differs in what data the packets contain, and how the packets are handled by the sender and receiver.
Differences between TCP and UDP
Unlike TCP, UDP does not provide for error checking, or recovery of packets that were lost in transit.
TCP is connection-oriented. The protocol requires that a communication session is established, and that the sender and receiver agree about what data was transferred. When TCP packets are received and pass an error check, the receiver responds with an acknowledgement. If TCP packets are corrupted or lost in transit, the receiver does not send an acknowledgement, and the sender eventually re-sends those packets.
UDP is connectionless. The receiver can request and listen for UDP packets, but no session is established (there is no “beginning” or “end,” data is merely sent and received). If UDP packets are corrupted or lost in transit, the receiver may not be aware of the error. The receiver does not report errors to the sender, or acknowledge that data was received.
HTTPS
Hypertext Transfer Protocol Secure (HTTPS) is a secure connection-oriented protocol that runs over port 443.
NetBIOS
Network Basic Input/Output System
NetBIOS was developed by IBM, Microsoft, and Sytek. NetBIOS allows computers and applications to communicate with network hardware, and allows data to transmit properly over a network. For example, Microsoft Windows computers that are named in a workgroup and not a domain use NetBIOS names, which are converted to IP addresses.
NetBIOS commonly communicates on ports 137, 138, and 139. If your firewall blocks any of these ports you may get errors when your computer communicates with another computer that utilizes NetBIOS (e.g., Microsoft Windows). To prevent these errors or warnings, you must provide access on these ports.
SOHO
Short for small office/home office, SOHO is a business where users work at their home or in a small office.
NIC
Short for network interface card, the NIC is also called an Ethernet card and network adapter. A NIC is a computer expansion card for connecting to a network (e.g., home network or Internet) using an Ethernet cable with an RJ-45 connector.
In a desktop computer, the network card is often located near the USB ports on the back if it’s an onboard version. If it’s a separate network card expansion card (not onboard), it usually is on the back of the computer, near the bottom, taking up a PCI slot.
In a laptop, the network card is integrated into the motherboard. The network port is usually on the side on the laptop, or it may be on the back. If you cannot find a network port on your laptop, it may only have a wireless network connection. You can purchase a network card for laptops, which is installed into a PC card slot on the side of the laptop, if available.
MAC
Short for Media Access Control, or MAC address. Known as a physical address and hardware address whose number is uniquely formatted in hexadecimal format and given to each computer or network device on a computer network.
MAC addresses can be 48-bit or 64-bit numbers divided into two parts. A unique three-byte OUI (Organizationally Unique Identifier) identifies the device’s manufacturer and must be purchased from the IEEE. The manufacturer assigns the remaining three or five bytes. After the number is generated, it’s considered burned into the firmware of the network access hardware.
Because a MAC address is a unique address, devices on a network do not share the same MAC address.
Example of a MAC address
D4-BE-D9-8D-46-9A
Note
IoT
Internet of Things (IoT) is an idea of all objects in the world being uniquely identifiable, tracked, and connected to the Internet. If every object could be identified and tracked businesses could more efficiently manufacture products, as they would know how much inventory they have available and what needs to be ordered. People could find whatever they needed very quickly and easily by executing a search of the Internet of things and locate the item or person they need. The world would be forever changed and, to the hope of many people, made better.
Back of RFID
The first technology considered to be the beginning of the Internet of Things was RFID. Devices with RFID had a unique identifier and could be tracked like inventory. Computer systems can identify where RFID devices are, within a specified range of distance. Security systems often use RFID devices for tracking employees in buildings or equipment in warehouses and can give a virtual map of everything in a building or warehouse.
People envision the future, the Internet of things, as a place where even people could be uniquely identified by some form of device or computer chip. It can provide for a safer world, but it could also create larger paranoia, where people think they are being watched. At the rate technology is advancing and shrinking in size, the Internet of things is not far fetched and could be closer than we think.
RFID
Short for radio frequency identification, a RFID is a small tag that enable a store or company to keep track of inventory.
NFC
Near-field communication (NFC) requires devices to be within about 10 centimeters of each other to transmit data.
IDS
Short for intrusion detection system, IDS is a security measure that notifies an administrator when a system policy is being violated. Such violations may include the unauthorized opening of a hardware device, or a network resource used without permission. For example, a corporate computer may be equipped with an IDS system that sounds an alarm and alerts the IT staff. IDS is helpful for companies concerned about employees opening a computer and stealing internal components such as RAM or installing something in the computer without authorization.
IPS
IPS is short for intrusion prevention system. An IDP is a device that helps monitor, log, and block malicious activity on a network. IPS works by looking for known signatures in an attack and watching for abnormal activity. When triggered, the system can immediately block the attack and alert an administrator.
UTM
Short for Unified Threat Management, a UTM is a networking device or software program that helps reduce the complexity of securing a network. It accomplishes this by including an anti-malware, content filter, firewall, intrusion detection, and spam protection into a single package. Usually, a UTM is used in a corporate environment. It may also feature application awareness, identity-based access control, QoS, load balancing, SSL inspection, and SSH inspection.
URL
Also known as an internet address or web address, a URL (Uniform Resource Locator) is a URI and standardized naming convention for addressing documents accessible over the Internet and Intranet. The URL makes it possible for a computer to locate and open a web page on a different computer on the Internet. An example of a URL is https://www.computerhope.com, the URL for the Computer Hope website.
SNMP
Short for Simple Network Management Protocol, SNMP was first introduced in 1988 and is a query, command, and response protocol. SNMP examines and changes configuration parameters of LAN and WAN connected repeaters, bridges, routers, switches, and other devices connected to a network.
SNMP defaults to use port 161.
SCADA
Supervisory Control and Data Acquisition (SCADA) systems consist of both hardware and software.
RADIUS
Remote Authentication Dial-In User Service (RADIUS) is a protocol for authentication servers that encrypts transmissions between client and server.
PCI
Short for peripheral component interconnect, PCI was introduced by Intel in 1992. The PCI bus came in both 32-bit (speed of 133 MBps) and 64-bit versions and was used to attach hardware to a computer. Although commonly used in computers from the late 1990s to the early 2000s, PCI has since been replaced with PCI Express.
Examples of PCI devices
Modem
Network card
Sound card
Video card
UEFI
Short for Unified Extensible Firmware Interface, UEFI is an upgrade to the traditional computer BIOS that Intel started developing as EFI. UEFI is an update that includes improved boot times, better security with cryptography, and better support for the hardware found in today’s computers.
UEFI is compatible with the standard hard drive partition format, which utilizes an MBR (master boot record) and the GPT (GUID partition table) partition format. Linux and Windows operating systems can utilize UEFI.
DDR3
Short for double data rate three, DDR3 is a type of DRAM (dynamic random-access memory) released in June 2007 as the successor to DDR2. DDR3 chips have bus clock speed of 400 MHz up to 1066 MHz, range in size from 1 to 24 GB, and consume nearly 30% less power than their predecessors. DDR3 RAM sticks for a desktop computer have 240 pins. For a laptop computer, DDR3 RAM sticks have 204 pins.
SMART
Self-Monitoring, Analysis, and Reporting Technology (S.M.A.R.T.) software installed on it, which monitors hard drive reliability and theoretically can warn you in the event of an imminent failure.
RAID
Redundant Array of Inexpensive (or independent ) discs
HSM
Hardware Security Module is a piece of hardware that can be removed and is used to hold encryption keys for a system.
SMB
Server Message Block (SMB) is the secure protocol used when scanning documents from a multifunction device to a server.
TPM
Trusted Platform Module (TPM) is an international standard for a dedicated security coprocessor, or cryptoprocessor.
HVPS
high-voltage power supply (HVPS) provides the high voltages used by both the charging corona and the transfer corona during the laser printer imaging process.
PCL
Printer Control Language (PCL) drivers depend on the printer hardware to create some of the effects such as filling in areas and making underlines.
PARITY
In general, parity is the quality of being even or odd. In computer science, a parity check, also called VRC (Vertical Redundancy Check), is a data validation technique. It is especially useful when data is transmitted or being read from a storage medium. The check is based on a parity bit, a single bit of metadata indicating whether the sum of the data bits is even or odd
ECC
Short for error-correcting code, ECC is a method of detecting and then correcting errors in the computer memory.
When purchasing computer memory you may notice ECC or Non-ECC memory, or error-correcting code memory and non-error correction code memory. Non-ECC memory is always cheaper.
Related information
Memory (RAM) help and support.
UEFI
Unified Extensible Firmware Interface, UEFI is an upgrade to the traditional computer BIOS that Intel started developing as EFI. UEFI is an update that includes improved boot times, better security with cryptography, and better support for the hardware found in today’s computers.
STP
Shielded twisted pair (STP) cabling has a foil shield surrounding the wire pairs to decrease electrical interference. Some STP cables also shield individual wire pairs.
UTP
Unshielded twisted pair (UTP) does not have the shielding. Both types use RJ-45 connectors, can follow the T568A wiring standard, and can be produced as plenum-rated cable that does not produce poisonous gas when burned.
SCSI
Short for Small Computer System Interface, SCSI is pronounced as “Scuzzy” and is an interface for disk drives that was first completed in 1982. Unlike competing standards, SCSI can support eight devices, or sixteen devices with Wide SCSI. However, with the SCSI host adapter on ID number 07 and booting from the ID 00. This leaves the availability of six device connections.
NVMe
Nonvolatile Memory Express
SSID
Service Set Identifier
Wireless Network
Specification Frequency Speed
802.11a 5 GHz up to 54 Mbps
802.11b 2.4 GHz up to 11 Mbps
802.11g 2.4 GHz up to 54 Mbps
802.11n (WiFi 4) 2.4 GHz or 5 GHz up to 600 Mbps - longest range - 70 metres indoors and 250 metres out doors.
802.11ac (WiFi 5) 5 GHz up to 1,300 Mbps (1.3 Gbps) in 5 GHzwith multiple access points - 35 metres indoors
802.11ax (WiFi 6) 2.4 GHz, 5 GHz, or 6 GHz up to 9.6 Gbps, commonly 600 Mbps
Class B private IP Address
The private address ranges are:
Class A – 10.0.0.0 through 10.255.255.255
Class B – 172.16.0.0 through 172.31.255.255
Class C – 192.168.0.0 through 192.168.255.255
IMAP
Internet Message Access Protocol (IMAP) is a secure protocol designed to download email.
SSH
Secure Shell (SSH) can be used to set up a secure session over port 22 for remote logins or for remotely executing programs and transferring files.
RDP
Remote Desktop Protocol
SMB
Server Message Block (SMB) is a protocol used to provide shared access to files, printers, and other network resources. In a way, it functions a bit like File Transfer Protocol (FTP), only with a few more options, such as the ability to connect to printers and more management commands.
ICMP
Short for Internet Control Message Protocol, ICMP is an extension to the Internet Protocol defined by RFC 792 and an error reporting protocol for TCP/IP messages. Most users are familiar with ICMP from using the ping command.
Upnp
Universal Plug and Play (UPnP) is a standard designed to simplify the process of connecting devices to a network and to enable those devices to automatically announce their presence to other devices on the network.
LDAP
The Lightweight Directory Access Protocol (LDAP) is a directory services protocol based on the X.500 standard. LDAP is designed to access information stored in an information directory typically known as an LDAP directory or LDAP database. This often includes employee phone numbers and email addresses.
SNMP
Simple Network Management Protocol (SNMP) gathers and manages network performance information.
UDP
User Datagram Protocol .Also called UDP/IP, it is an alternative to TCP/IP that sacrifices reliability for speed and simplicity.
Like TCP, UDP transfers packets using IP (Internet Protocol). However, it differs in what data the packets contain, and how the packets are handled by the sender and receiver.
IDS
intrusion detection system (IDS) will monitor and alert you on suspect behavior. The IDS can be a network-based device or host-based, meaning it runs as a process in the background.
IPS
The intrusion prevention system (IPS), however, should attempt to block the activity.
UTM
Unified Threat Management (UTM) systems can be hardware networking devices, virtual devices, or an off-premises service. UTM’s role is to combine several security features and services into a single device, allowing for easier management and compatibility.
WAP
wireless access point
KVM
Stands for “Keyboard, Video, and Mouse switch.” As the name implies, a KVM switch allows you to used multiple computers with the same keyboard, video display, and mouse.
SMTP
Short for Simple Mail Transfer Protocol, SMTP is an Internet standard for the sending of e-mail messages over port 25.
Iaas
Infrastructure as a Service is a type of cloud computing service that provides servers, data storage, virtual machines, and network connections as an on-demand service.
Paas
PaaS is a type of cloud computing that provides a remote computing and development platform as an on-demand service. PaaS providers supply remote hardware infrastructure (servers, data storage, virtual machines, and network connections) and a software platform (an operating system, development tools, and database software). It allows businesses to build and run software on remote servers without running their own data center, server hardware, or software platform.