Dion Flashcards
Broadcast domain
Routers break up broadcast domains.
All ports on hubs and switches are in the same broadcast domain.
Collision domain
Switches and routers break up collision domains.
All ports on a hub are in the same collision domain.
RADIUS
A RADIUS (Remote Authentication Dial-In User Service) server is a central server that authenticates and authorizes remote users who access a network. RADIUS servers receive authentication requests from RADIUS clients, such as routers, firewalls, or VPNs. The RADIUS server verifies the user’s credentials and returns an authorization decision to the client.
RST
RST (reset) is a TCP flag that is used to terminate a connection when the sender senses that something has gone wrong with the connection.
FIN
FIN (finish) is a TCP flag that is used to request that a connection be terminated. This usually occurs at the end of a session and allows the system to release the system resources that were previously reserved for this connection.
SYN/ACK
SYN (synchronize) and ACK (acknowledge) are TCP flags used during the TCP three-way handshake at the beginning of a connection.
Sender: SYN
Receiver: SYN-ACK
Sender: ACK
Port security
Also known as MAC learning or Sticky MAC, this type of port security allows a switch to remember dynamically learned MAC addresses when the switch or interface is restarted or goes offline. The switch will only allow the computer with the original MAC address to connect via that switchport.
NetBIOS
NetBIOS, similar to DNS, allows primarily Windows machines to connect to each other by using a name rather than an IP address.
The “nbtstat -R” command will purge and reload the cached name table from the LMHOST file on their Windows workstation.
eDiscovery
A form of digital investigation that attempts to find evidence in email, business communications and other data that could be used in litigation or criminal proceedings.
DOCSIS modem
DOCSIS modems are cable modems that use coaxial cable with an F connector.
Analog modem
Analog modems convert digital computer signals to tones that can be carried over POTS (telephone) lines. These cables use RJ-11 connectors.
UTM
A Unified Threat Management appliance enforces a variety of security-related measures, combining the work of a firewall, malware scanner, and intrusion detection/prevention.
BGP
Border Gateway Protocol is a type of Exterior Gateway Protocol that allows Autonomous Systems on the internet to exchange routing information.
Geo-IP
Geo-IP/Geolocation identifies the country of origin of a host based on IP address.
802.1q
802.1q is a standard that allows traffic from several different VLANs to be transmitted across one trunk port. The traffic is then split up and appropriately sent to the correct VLANs once it reaches the other switch.
Trunking allows VLANs to be split up across separate physical switches.
RDP port number
3389
802.11g specs
2.4GHz and up to 54 Mbps
DHCP snooping
DHCP snooping are techniques used to improve the security of a DHCP infrastructure. This feature determines whether traffic sources are trusted or untrusted and is used to protect against rogue DHCP servers.
On Cisco networking devices, the “show config” command will display information including whether or not DHCP snooping is enabled.
Plenum-rated cable
Plenum-rated cables are designed to not burn as easily as normal cables. They are meant to be used in plenum spaces, which are used for air circulation.
PVC network cables can be hazardous because they create a noxious gas when burnt.
RPO
The recovery point objective (RPO) is the interval of time that might pass during a disruption before the quantity of data lost during that period exceeds the Business Continuity Plan’s maximum allowable threshold or tolerance.
WPS Attack
A WPS attack is a type of attack where a hacker exploits vulnerabilities in Wi-Fi Protected Setup (WPS) to gain access to a network. The most common method is a brute force attack, where the hacker uses a password generating tool to guess the PIN associated with the access point.
There are only 100 million possible PINs for WPS and and a design flaw exists that essentially lowers the number of possible PINs even further.
ipconfig /release
ipconfig /renew
These commands are used together in order to get a new dynamic IP address from the DHCP server.
Fusion splicer
Tool that joins two pieces of fiber optic cable together. This is used to repair breaks or simply make extra-long cables.
802.11a specs
5GHz at up to 54 Mbps.
802.11b specs
2.4GHz and up to 11 Mbps.
Emergency change management
An emergency change approval board (ECAB) can be executed extremely quickly to gain approval, and then the documentation can be completed after the change is made.
802.11n specs
2.4GHz and up to 108 Mbps.
5.0GHz and up to 600 Mbps.
Type 1 hypervisor
Sits on top of bare-metal server hardware.
Wiring diagram
Wiring diagrams clearly label which cables are connected to which ports.
802.11ac specs
5GHz and up to 5.5Gbps
Syslog levels
0 - Emergency: The system is unusable
1 - Alert: Immediate action is needed
2 - Critical: Critical conditions
3 - Error: Error conditions
4 - Warning: Warning conditions
5 - Notice: Normal but significant condition
6 - Informational: Informational messages
7 - Debug: Debug-level messages
Wardriving
Wardriving is the act of searching for Wi-Fi wireless networks, usually from a moving vehicle, using a laptop or smartphone.
authPriv
authPriv is an SNMPv3 option that ensures communications are sent with authentication (via MD5 and SHA) and encryption (DES and AES).
802.3af
Defines the Power over Ethernet (PoE) standard.
15.4W of DC power to each device.
802.1x
A network authentication protocol that opens ports for network access when an organization authenticates a user’s identity (usually RADIUS) and authorizes them for access to the network.
This is commonly used in captive portals.
Dynamic ARP Inspection
Dynamic ARP Inspection allows a network administrator to intercept, log, and discard ARP packets with invalid MAC address to IP address bindings.
Time-division multiplexing
Allows for two or more signals or bitstreams to be transferred in what appear to be simultaneous sub-channels in one communication channel but is physically taking turns on the channel.
This technology, used in single PRI (ISDN or T-1) services, allows video calls, data, and other network services to be transmitted over the circuits of the traditional PSTN (Public Switched Telephone Network).
LDAP port
Lightweight Directory Access Protocol runs on port 389.
SNMP
Simple Network Management Protocol uses UDP ports 161 and 162.
A unique objective identifier (OID) identifies a variable that can be read or set using the SNMP protocol and refers to a specific device setting and its status.
OIDs point to network objects stored in a database called the Management Information Base (MIB).
LACP
The Link Aggregation Control Protocol (LACP) is the 802.3ad protocol used to group numerous physical ports to make one high bandwidth path. This method can increase bandwidth and therefore, throughput. LACP can also provide network redundancy and load balancing.
OSPF
Open Shortest Path First is a dynamic link-state routing protocol. OSPF is an Interior Gateway Protocol and does support IPv4 and VLSM.
Crossover cable
A crossover cable is said to connect “like devices to like devices.” In practice, they’re used to connect PCs to other PCs and routers to PCs.
On a cable tester, the wires would appear to cross over each other.
Patch/straight-through cable
A patch cable will connect switches/hubs to routers/PCs.
On a cable tester, the wires would appear to go straight from one end to the other.
Rollover cable
A rollover cable is used to connect directly to a device’s console port to make programming changes to the device.
On a cable tester, the wires would appear to go from one pin to the opposite pin (as if reflected in a mirror).
NAC
Network Access Control is a cybersecurity technique that restricts unauthorized users and devices from accessing a private network. NAC is a set of rules, protocols, and processes that govern access to network-connected resources.
SIEM
A security information and event management (SIEM) system provides real-time analysis of security alerts generated by applications and network hardware.
TACACS+
TACACS+ is a Cisco proprietary AAA (accounting, authorization, and authentication) protocol to provide AAA services for access to routers, network access points, and other networking devices. TACACS+ is a remote authentication protocol, which allows a remote access server to communicate with an authentication server to validate user access onto the network. TACACS+ allows a client to accept a username and password, and pass a query to a TACACS+ authentication server.
OTDR
An Optical Time Domain Reflectometer is used by organizations to certify the performance of new fiber optics links and detect problems with existing fiber links. An OTDR can identify if a fiber cable is broken and provide an approximate location for the break in meters or feet.
LDAPS
Lightweight Directory Access Protocol Secure (LDAPS) uses port 636 and is an open, vendor-neutral, industry-standard application protocol for accessing and maintaining distributed directory information services over an Internet Protocol (IP) network that is encrypted using an SSL or TLS connection.
NDA
A non-disclosure agreement (NDA) is a documented agreement between two parties that define what data is considered confidential and cannot be shared outside of that relationship. An NDA is used to protect an organization’s intellectual property.
SQLNet/Net8
SQLNet uses port 1521, and is a relational database management system developed by Oracle that is fully compatible with the structured query language (SQL).
ATM
ATM (Asynchronous Transfer Mode) networks operate at OSI layer 2 and use cells rather than frames. Cells have a shorter length (53 octets or bytes) that allows for faster switching of the cells across the network.
ATM is sometimes found in SONET networks.
WPA
Wi-Fi Protected Access (WPA) is an improved encryption scheme for protecting Wi-Fi communications designed to replace WEP. WPA uses the RC4 cipher and a temporal key integrity protocol (TKIP) to overcome the vulnerabilities in the older WEP protection scheme.
Bandwidth
Bandwidth is the maximum rate of data transfer across a given network. Bandwidth is more of a theoretical concept that measures how much data could be transferred from a source to a destination under ideal conditions.
WINS server
The Windows Internet Name Service (WINS) can accept NetBIOS name registrations and queries. WINS servers maintain a database of NetBIOS name to IP address mappings for WINS clients on the network and speed up NetBIOS name resolution by eliminating broadcasts.
WINS servers do not use the same FQDNs that DNS servers do.
Degaussing
Degaussing a hard drive involves demagnetizing a hard drive to erase its stored data. You cannot reuse a hard drive once it has been degaussed.
Signal-to-noise ratio
Compares the level of a desired signal to the level of background noise. A high SNR on a wireless network is good and means faster speeds.
Pre-action fire suppression system
A pre-action system minimizes the risk of accidental release from a wet pipe system. With a pre-action system, both a detector actuation like a smoke detector and a sprinkler must be tripped prior to water being released.
Multimeter
A multimeter is a measuring instrument that can measure the voltage, resistance (ohms), and amperage of a cable or conduit.
Jitter
Jitter is a network condition that occurs when a time delay in the sending of data packets over a network connection occurs. A jitter is simply a variation in the delay of the packets, and this can cause some strange side effects, especially for voice and video calls.
Control Plane Policing (CoPP)
Control Plane Policing (CoPP) is a Quality of Service (QoS) mechanism, primarily on Cisco equipment, that protects a device’s route processor from unnecessary traffic. It allows users to configure a QoS filter that manages the traffic flow of control plane packets. This protects the control plane from malicious network attacks like Denial of Service (DoS) attacks.
5G
5G cellular technology is made up of three different types: low-band, mid-band, and high-band mmWave technology. Low-band 5G reaches an average speed of 55 Mbps with a theoretical speed of 150 Mbps. Mid-band 5G reaches an average speed of 150 Mbps with a theoretical speed of 1.5 Gbps. High-band 5G reaches an average speed of 3 Gbps with a theoretical speed of up to 70 Gbps.
MPLS
Multi-protocol label switching (MPLS) is a mechanism used within computer network infrastructures to speed up the time it takes a data packet to flow from one node to another. The label-based switching mechanism enables the network packets to flow on any protocol. This is commonly used in WANs.
Giant
A giant is any Ethernet frame that exceeds the 802.3 frame size of 1518 bytes.
Runt
A runt is an ethernet frame that is less than 64 bytes in size.
CRC
Cyclic Redundancy Checksum (CRC) is an error-detecting code commonly used in digital networks and storage devices to detect accidental changes to raw data as it transits the network. If the checksum generated by the sender doesn’t match the one calculated by this interface upon receipt, a CRC error is counted and the packet is rejected.
Piggybacking
A piggybacking attack is a social engineering attempt by cyber threat actors in which they trick employees into helping them gain unauthorized access into the company premises. The big difference between tailgating and piggybacking is permission (piggybackers are given permission by authorized personnel).
Convergence
In a converged network, all routers “agree” on what the network topology looks like.
This occurs in networks that use dynamic routing.
IP scanner
An IP scanner is used to monitor a network’s IP address space in real-time and identify any devices connected to the network. Essentially, the tool will send a ping to every IP on the network and then creates a report of which IP addresses sent a response.
Port scanner
A port scanner is used to determine which ports and services are open and available for communication on a target system.
Netflow analyzer
A NetFlow analyzer is used to perform monitoring, troubleshooting, inspection, interpretation, and synthesis of network traffic flow data. They can calculate metrics like bandwidth utilization, top talkers, top applications, and protocols.
Hub and spoke topology
Similar to a star topology but referring to a WAN.
VNC
VNC (virtual network computing) is a remote access tool and protocol, similar to Microsoft’s RDP. It is used for screen sharing on Linux and macOS.
Patch antenna
A patch antenna is a type of radio antenna with a low profile, which can be mounted on a flat surface. A patch antenna is typically mounted to a wall or a mast and provides coverage in a limited angle pattern. Patch antennas can be directional or omnidirectional.
Whip antenna
A whip antenna is a vertical omnidirectional antenna that is usually utilized in indoor environments. A whip antenna is omnidirectional and cannot be used for directional use cases.
Optical link budget
An optical link budget is a calculation that considers all the anticipated losses along the length of a fiber optic connection. Signal loss across a fiber optic cable occurs naturally due to the distance of the cable, as well as from losses due to multiplexing, bends in the cable, imperfect connections, patches, or splices along the fiber optic cable.
Base-S Ethernet standards
Any Ethernet standard that contains Base-S signifies a short range connection that uses MULTIMODE fiber.
Dirty fiber optic connectors
When fiber optic connectors become dirty, signal loss can cause severe problems and performance issues. Something as simple as oil from a technician’s hand can render a fiber connector dirty and cause a loss of signal. The technician would need to use appropriate cleaning cloth to clean the dirty connectors and restore the service.
POP3 port number
TCP 110
POP3 over SSL/TLS port number
TCP 995
RS-232
RS-232 is a standard for serial communication transmission of data. A DB-9 connector is often found on a rollover or console cable and is used to connect a router to a laptop using the RS-232 serial transmission protocol for configuring a network device.
Route poisoning
Route poisoning is a method to prevent a router from sending packets through a route that has become invalid within computer networks. This is achieved by changing the route’s metric to a value that exceeds the maximum allowable hop count so that the route is advertised as unreachable.
Virtual terminal limit
You can set a limit of how many virtual terminals can simultaneously remotely connect to a switch. The default virtual terminal limit is 32 on Cisco devices, but you can configure it to allow between 1 and 64 simultaneous connections.
DWDM
Dense wavelength-division multiplexing (DWDM) is a high-speed optical network type commonly used to increase bandwidth in MANs (metropolitan area networks). DWDM uses as many as 32 light wavelengths on a single fiber, where each wavelength can support as many as 160 simultaneous connections.
Application-aware firewall
An application-aware firewall can make decisions about what applications are allowed or blocked by a firewall, as opposed to simply using IP addresses and port numbers.
This differs from stateful/stateless inspection firewalls which do not operate at OSI layers 6 or 7.
Kerberos
Kerberos is a protocol for authenticating service requests between trusted hosts across an untrusted network, such as the internet. Kerberos uses strong encryption to protect its information.
Captive portal
A captive portal is a web page accessed with a web browser that is displayed to newly connected users of a wireless network before they are granted broader access to network resources.
In general, captive portals are implemented by using an HTTP redirect, an ICMP redirect, or a DNS redirect.
Discovery protocols
Discovery protocols such as SNMP, LLDP (Link Layer Discovery Protocol) and ping are able to get detailed information such as the IP addresses, system version, and device information from supporting devices directly.
Bluejacking
Bluejacking is when an attacker sends unsolicited messages to a victim’s Bluetooth-enabled device.
Snort
Snort is a network based intrusion detection system. Snort will check the packets against all of the IDS alert rules before sending out alerts and allowing the packet to continue its journey.
T-568A
white/green, green, white/orange, blue, white/blue, orange, white/brown, brown
Crossover cables use T-568A on one side and T-568B on the other side.
T-568B
white/orange, orange, white/green, blue, white/blue, green, white/brown, brown
Straight-through cables use T-568B on both ends.
Deauthentication attack
A deauthentication attack is a type of denial-of-service attack that targets communication between a user and a Wi-Fi wireless access point by sending a deauthentication frame to the victim’s machine. This causes the wireless client to disconnect from the wireless network and then reconnect. During that reconnection, an attacker can conduct a packet capture of the authentication handshake and use that to attempt to brute force the network’s pre-shared key.
show route
The “show route” command is used on a Cisco networking device to display the current state of the routing table for a given network device. To determine if Ethernet0/0 is connected using OSPF or EIGRP, you would need to use the “show route” command to display the current status.
Frequency jamming
Frequency jamming is the disruption of radio signals through the use of an over-powered signal in the same frequency range. It works by denying service to authorized users as legitimate traffic is jammed by the overwhelming frequencies of illegitimate traffic.
nmap
nmap, or Network Mapper, is a cross-platform, open-source tool used to scan IP addresses and ports on a target network, and to detect running services, applications, or operating systems on that network’s clients, servers, and devices.
SRV
A DNS service (SRV) record specifies a host and port for specific services such as voice over IP (VoIP), instant messaging, and others.
PTR
PTR records are used for the Reverse DNS (Domain Name System) lookup. Using the IP address, you can get the associated domain/hostname. An A record should exist for every PTR record.
SOA
A Start of Authority (SOA) resource record indicates which Domain Name System (DNS) server is the best source of information for the specified domain.
Repeater
A repeater is a networking device that receives a signal and then rebroadcasts it to extend the distance covered by a network. A repeater can operate either as a wired or wireless repeater.
VDI
Virtual Desktop Infrastructure (VDI) is a software technology that separates the desktop environment from the physical client device that is used to access it. VDI hosts desktop environments on a centralized server and deploys them to end-users on request. The desktop images run within virtual machines (VMs) and are delivered to end clients over a network.
DOCSIS cable
Data Over Cable Service Interface Specification (DOCSIS) is used to connect a client’s local area network to a high-bandwidth internet service provider over an existing coaxial/HFC cable TV system.
HFC stands for hybrid fiber-coaxial.
Fiber light meter
A fiber light meter, also known as an optical power meter, is used to measure the power in an optical signal over a fiber optic cable. A fiber light meter could be used to test if the cable is broken, but it would not be able to determine where the break in the fiber cable is located.
RTP
The Real-time Transport Protocol (RTP) is a network protocol that delivers audio and video over IP networks. It’s used in communication and entertainment systems that involve streaming media, such as telephony, video teleconference applications, television services, and web-based push-to-talk features.
ESD
Electrostatic discharge (ESD) is a sudden transfer of electric charge between two objects, such as a human and a computer component. ESD can damage sensitive electronic parts, such as the motherboard, CPU, RAM, or hard drive, by creating tiny holes or burns in their circuits.
TXT
The DNS text (TXT) record lets a domain administrator enter text into the Domain Name Systems. The TXT record was originally intended as a place for human-readable notes. However, now it is also possible to put some machine-readable data into TXT records. TXT records are a key component of several different email authentication methods (SPF, DKIM, and DMARC) that help an email server determine if a message is from a trusted source.
RAS
A remote access server (RAS) or remote desktop gateway is a type of server that provides a suite of services to connect users to a network or the Internet remotely.
DNSSEC
The Domain Name System Security Extensions (DNSSEC) is a suite of extension specifications by the Internet Engineering Task Force for securing data exchanged in the Domain Name System in Internet Protocol networks.
Teredo tunneling
Teredo is a transition technology that gives full IPv6 connectivity for IPv6-capable hosts that are on the IPv4 Internet but have no native connection to an IPv6 network.
iSCSI
iSCSI stands for Internet Small Computer System Interface. It’s a storage area networking (SAN) protocol that allows you to send block storage from storage arrays or devices to client computers.
iSCSI network performance can be improved by enabling jumbo frames (over 1500 bytes).
mGRE
Multipoint GRE (mGRE) is a protocol that can be used to enable one node to communicate with many nodes by encapsulating layer 3 protocols to create tunnels over another network. The mGRE protocol is often used in Dynamic Multipoint VPN (DMVPN) connections.
QoS
Quality of Service (QoS) is a traffic control process that helps companies adjust their overall network traffic based on the requirements of specific time-sensitive applications. QoS reduces common quality degradation issues such as: Packet loss, Network jitter, High latency. QoS can prioritize specific high-performance applications.
Quality of Service usually operates at either Layer 2 or Layer 3 of the OSI model, depending on if you are using CoS (layer 2) or DSCP (layer 3).
Non-persistent agent
In a NAC environment, a non-persistent agent is used to access the device during a one-time check-in at login. The non-persistent agent is software the client runs (usually from a browser) as they are connecting so the agent can perform the checks, but the software does not permanently stay with the client after they disconnect.
CSU/DSU
A CSU/DSU (Channel Service Unit/Data Service Unit) is a hardware device about the size of an external modem that converts digital data frames from the communications technology used on a local area network (LAN) into frames appropriate to a wide-area network (WAN) and vice versa. A CSU/DSU is used to terminate a T1 connection at the customer’s site.
Zero trust
Zero-trust is a security framework that requires all users, whether in or outside the organization’s network, to be authenticated, authorized, and continuously validated for security configuration and posture before being granted or keeping access to applications and data.
PPTP
Point-to-Point Tunneling Protocol (PPTP) is an obsolete network protocol that is rarely used today. It was originally designed to create an encrypted tunnel across dial-up connections. PPTP is considered obsolete because it has many known security issues.
OC-12
OC-12 is a type of fiber optic cable.
NFC
Near-Field Communication (NFC) is a set of communication protocols for communication between two electronic devices over a distance of 4 cm or less. NFC is used with payment systems like Apple Pay, Samsung Pay, and Google Pay since it supports two-way communication, unlike RFID which only supports one-way data transfers.
RFID
Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects.
MX
An MX record is used for outgoing (SMTP) and incoming (POP3/IMAP) traffic.
CNAME
A CNAME record is a canonical name or alias name, which associates one domain name as an alias of another (like beta.diontraining.com and www.diontraining.com could refer to the same website using a CNAME).
Asymmetric Routing
Asymmetric routing is when network packets leave via one path and return via a different path (unlike symmetric routing, in which packets come and go using the same path).
Duplicate MAC address
A duplicate MAC address occurs when two or more devices are responding to data requests as if they are the only device on the network with that physical address. One indication of this occurring is when a switch continually changes the port assignments for that address as it updates its content-addressable memory (CAM) table to reflect the physical address and switchport bindings.
This will cause the switchports to continually flap by going up and down as the assignments are updated within the CAM table.
Statement of Work
A Statement of Work (SOW) is a document that outlines all the work that is to be performed, as well as the agreed-upon deliverables and timelines.
DHCP port numbers
UDP 67 (server)
UDP 68 (client)
SSH port number
TCP 22
Telnet port number
TCP 23
Signal reflection
Metal and glass are considered highly reflective materials which can cause poor cellular service and connectivity within office buildings that use intricately designed glass walls and ceilings. If a large amount of reflection occurs, signals can be weakened and cause interference at the receiver’s device. In addition to reflection, some of the radio waves can also pass through the glass and refract into different directions of travel. Both reflection and refraction can decrease the signal strength between the transmitter and the receiver.
Traffic shaping
Traffic shaping, also known as packet shaping, is the manipulation and prioritization of network traffic to reduce the impact of heavy users or machines from affecting other users. Traffic shaping is used to optimize or guarantee performance, improve latency, or increase usable bandwidth for some kinds of packets by delaying other kinds.
WAF
A web application firewall (WAF) is a security tool that protects web applications from cyber threats, vulnerabilities, and attacks. WAFs monitor and filter HTTP traffic between a web application and the internet.
Crosstalk
Crosstalk is defined as an effect caused by the unintentional and undesired transmission (leakage) of a signal from one cable to another. When abused, a cable’s shielding could be damaged and the cable may no longer be made up of the same consistency, leading to crosstalk.
Crosstalk can also occur when cable pairs are not completely twisted.
IGMP snooping
IGMP stands for Internet Group Management Protocol. It’s a layer 3 protocol that allows multiple devices to share an IP address and receive the same data. IGMP is used to set up multicasting on networks that use the Internet Protocol version 4 (IPv4).
T1
T1 can transmit 24 telephone calls at a time because it uses a digital carrier signal (DS-1). DS-1 is a communications protocol for multiplexing the bit streams of up to 24 telephone calls simultaneously. The T1’s maximum data transmission rate is 1.544 Mbps.
Switch spoofing
Switch spoofing is when an attacker configures their machine to report itself as a switch. This is usually done as a way to hop VLANs.
DLP
Data loss prevention (DLP) systems are used to ensure that end-users do not send sensitive or critical information outside the corporate network. These DLP products help a network administrator control what data end users can transfer.
DNS port number
53
Split horizon
A split-horizon route advertisement is a method of preventing routing loops in distance-vector routing protocols by prohibiting a router from advertising a route back onto the interface from which it was learned.
IP helper
DHCP IP Helper addresses enable a single DHCP server to provide DHCP IP addresses to every PC on the network, regardless of whether they are on the same broadcast domain as the DHCP server or not.
3G
3G cellular technology is made up of two different technologies: HSPA+ and EV-DO. HSPA+ (Evolved High-Speed Packet Access) is a 3G standard used for GSM cellular networks and can support up to a theoretical download speed of 168 Mbps and a theoretical upload speed of 34 Mbps. EV-DO (Evolution-Data Optimized) is a 3G standard used for CDMA cellular networks and can support up to 3.1 Mbps downloads.
Autonomous system number
An ASN (or Autonomous System Number) is used to control routing with BGP routing protocols to route traffic across the network. An Autonomous System (AS) is a group of one or more IP prefixes (lists of IP addresses accessible on a network) run by one or more network operators that maintain a single, clearly defined routing policy. Network operators need Autonomous System Numbers (ASNs) to control routing within their networks and to exchange routing information with other Internet Service Providers (ISPs).
SCADA
SCADA (supervisory control and data acquisition) networks work off an ICS (industry control system) and maintain sensors and control systems over large geographic areas.
CCMP
CCMP, also known as AES CCMP, is the encryption mechanism that has replaced TKIP, and it is the security standard used with WPA2 wireless networks.
hostname
The hostname command is used to view or change a computer’s hostname and domain. On a Windows system, the hostname, computer name, and NetBIOS name are all the same.