Chapter 19 - Protecting Your Network
Defined
1. Mantrap
2. Monlist
3. NAC
4. Network-Based anti-malware
5. Network-based firewall
6. Network Closet
7. Non-persistent agent
8. Ntpdc
9. OUI
10. Outbound traffic
11. PDos
12. Persistent agent
13. Phishing
14. Posture Assessment
15. Proximity Reader
16. Quarantine Network
17. Reddit Effect
18. Reflection
19. Cipher lock
20. Cleartext credential
21. Closed circuit television
22. Cloud
23. DZ
24. DOS
25. DHCP snooping
26. DDOS
27. DAC
28. DAI
29. Edge
30. Effective permission
31. External firewall
32. Fail close
33. Fail open
34. Fault tolerance
35. Firewall
36. Guest network
37. Hardening
38. Hardware Appliance
39. Honeynet
40. Honeypot
41. Host-Based Anti-Malware
42. Host-Based Firewall
43. Implicit Deny Any
44. Inbound Traffic
45. Inheritance
46. Internal Firewall
47. IP Camera
48. Key Fob
49. Keypad
50. Macro
51. Malicious Employee
52. Malicious User
53. Malware
54. Man-In-The-Middle
55. Reddit effect
56. Quarantine network
57. Proximity reader
58. Posture assessment
59. Pashing
60. Persistent agent
61. Permanent dos
62. Outbound traffic
63. OUI
64. Ntpdc
65. Non-persistent agent
66. Network closet
67.Network based firewall
68. Anti-malware
69. Nac
70. Mon list
71. Mantrap
72. Reflection
73. Threat
74. TEMPEST
75. Tail gating
76. Stateless inspection
77. Stateful inspection
78. Spyware
79. Spoofing
80. Reflection
81. RF emanation
82. Rootkit
83. Security Guard
84. Services
85. Session Hijacking
86. Signature
87. Slash dotting
88. Social Engineering
89. SOHO firewall
90. Smurf attack
91. Traffic spike
92. Trojan horse
93. Trusted user
94. Unencrypted user
95. Unified Threat Management (UTM)
96. Untrusted user
97. Video monitoring
98. Virus
99. Virus shield
100. VLAN hopping
101. Vulnerability
102. Worm
103. Zero-day attack
104. zombie
Showing posts with label NetPlus. Show all posts
Showing posts with label NetPlus. Show all posts
Thursday, March 12, 2020
Tuesday, March 3, 2020
Network+ Chapter 20 Power Words - Blank
Chapter 20 – Network Monitoring
- Log Management
- Managed device
- Managed network
- MIB
- Netflow
- Netflow collector
- NOC
- Packet analyzer
- Packet sniffer
- Performance monitors
- PDU
- Response Time
- SIEM
- Set
- SMS
- SNMP manager
- SNM
- Top listener
- Top talker
- Trap
- Variable
- Wireshark
Network+ Chapter 17 Power Words - Blank
Chapter 17 - Building a Real World Network
- Air Gap
- CAN
- CoS
- Compatibility Requirements
- Device Types/Requirements
- DiffServ
- DCS
- Environment Limitations
- Equipment Limitations
- H.320
- H.323
- HMI
- ICS Server
- ICS
- List of Requirements
- MGCP
- Medianet
- Metro Ethernet
- Operator
- Power Converter
- Power Redundancy
- PLC
- RTP
- Real-time Video
- RTU
- Security Considerations
- SIP
- SCADA
- UC Device
- UC Gateway
- UC Server
- UC
- VTC
- Wired/Wireless Considerations
Network+ Chapter 9A Power Words - Blank
Network + Chapter 9A
Defined
Defined
- A record
- Active Directory
- Authoritative DNS server
- Authoritative name server
- Cached lookups
- Cache-only DNS server
- CNAME
- DNS root server
- DNS server
- DNS tree
- DIG
- DNS
- DDNS
- Flat Name Space
- Forward Lookup Zone
- FQDN
- Hierarchical Name Space
- Host Name
- Hosts File
Network+ Chapter 2A Power Words - Blank
Chapter 2 - Network Models
- Application layer
- API
- Broadcast
- Broadcast Address
- CRC
- Data Link Layer
- Datagram
- De-encapsulation
- Device ID
- Encapsulation
- EUI-48
- Frame
- FCS
- Internet Layer
- IP
- IP Address
- Link Layer
- Logical Address
- Logical Addressing
- LLC
- MAC
- MAC Address
- Model
- NIC
Monday, March 2, 2020
Table Of Contents
A+
Chapter 1 - The Path of the PC TechDefined
Blank
Chapter 2 - Operational Procedures
Defined
Blank
Chapter 3 - The Visible Computer
Defined
Blank
Chapter 4 - Microprocessors
Defined
Blank
Chapter 5 - RAM
Defined
Blank
Chapter 6 - BIOS
Defined
Blank
Chapter 7 - Motherboards
Defined
Blank
Chapter 8 - Power Supplies
Defined
Blank
Chapter 9 - Hard Drive Technologies
Defined
Blank
Chapter 10 - Implementing Hard Drives
Defined
Blank
Chapter 11 - Essential Peripherals
Defined
Blank
Chapter 12 - Building a PC
Defined
Blank
Chapter 13 - Windows Under the Hood
Defined
Blank
Chapter 14 - Users, Groups. and Permissions
Defined
Blank
Chapter 15 - Maintaining and Optimizing Operating Systems
Defined
Blank
Chapter 16 - Working with the Command-Line Interface
Defined
Blank
Chapter 17 - Troubleshooting Operating Systems
Defined
Blank
Chapter 18 - Virtualization
Defined
Blank
Chapter 19 - Display Technologies
Defined
Blank
Chapter 20 - Essentials of Networking
Defined
Blank
Chapter 21 - Local Area Networking
Defined
Blank
Chapter 22 - Wireless Networking
Defined
Blank
Chapter 23 - The Internet
Defined
Blank
Chapter 24 - Portable Computing
Defined
Blank
Chapter 25 - Understanding Mobile Devices
Defined
Blank
Chapter 26 - Care and Feeding of Mobile Devices
Defined Coming Soon
Blank Coming Soon
Chapter 27 - Printers and Multi-function Devices
Defined
Blank
Chapter 28 - Securing Computers

Blank
Network+
Chapter 3
Defined
Blank
Chapter 4A
Defined
Blank
Chapter 4B
Defined
Blank
Chapter 5A
Defined
Blank
Chapter 5B
Defined
Blank
Chapter 6A
Defined
Blank
Chapter 6B
Defined
Blank
Chapter 7A
Defined
Blank
Chapter 7B
Defined
Blank
Chapter 8A
Defined
Blank
Chapter 8B
Defined
Blank
Chapter 9A
Defined
Blank
Chapter 9B
Defined
Blank
Chapter 10
Defined
Blank
Chapter 11A
Defined
Blank
Chapter 11B
Defined
Blank
Chapter 12A
Defined
Blank
Chapter 12B
Defined
Blank
Chapter 13
Defined
Blank
Chapter 14
Defined
Blank
Chapter 15
Defined
Blank
Chapter 16
Defined
Blank
Chapter 17
Defined
Blank
Chapter 18
Defined
Blank
Chapter 19
Defined
Blank
Chapter 20
Defined
Blank
Chapter 21
Defined
Blank
Defined
Blank
Chapter 4A
Defined
Blank
Chapter 4B
Defined
Blank
Chapter 5A
Defined
Blank
Chapter 5B
Defined
Blank
Chapter 6A
Defined
Blank
Chapter 6B
Defined
Blank
Chapter 7A
Defined
Blank
Chapter 7B
Defined
Blank
Chapter 8A
Defined
Blank
Chapter 8B
Defined
Blank
Chapter 9A
Defined
Blank
Chapter 9B
Defined
Blank
Chapter 10
Defined
Blank
Chapter 11A
Defined
Blank
Chapter 11B
Defined
Blank
Chapter 12A
Defined
Blank
Chapter 12B
Defined
Blank
Chapter 13
Defined
Blank
Chapter 14
Defined
Blank
Chapter 15
Defined
Blank
Chapter 16
Defined
Blank
Chapter 17
Defined
Blank
Chapter 18
Defined
Blank
Chapter 19
Defined
Blank
Chapter 20
Defined
Blank
Chapter 21
Defined
Blank
Thursday, February 27, 2020
Network+ Chapter 18 Power Words - Defined
Chapter 18 – Managing Risk
Blank
Blank
- Acceptable Group Policy - a feature of the Microsoft Windows NT family of operating systems that controls the working environment of user accounts and computer accounts
- Aircrack-ng - a network software suite consisting of a detector, packet sniffer, WEP and WPA/WPA2-PSK cracker and analysis tool for 802.11 wireless LANs. It works with any wireless network interface controller whose driver supports raw monitoring mode and can sniff 802.11a, 802.11b and 802.11g traffic
- Approval Process - the method an organization uses to approve anything from documents, invoices, budgets, and purchase orders, to a new process that a company wants to institute
- Archive - place or store (something)
- Backup - an extra copy of data from a computer
- Business Continuity Plan (BCP) - the process of creating systems of prevention and recovery to deal with potential threats to a company. In addition to prevention, the goal is to enable ongoing operations before and during execution of disaster recovery
- Chain of custody - a document that is borrowed from law enforcement that tracks evidence from the time the Computer Forensics Examiner gains possession of the item until it is released back to the owner
- Change management - the control of the supply chain as a process from supplier to manufacturer to wholesaler to retailer to consumer. ... In computing, SCM typically is used in reference to software applications that enable more efficient management of the supply chain
- Change management team – Team that does change management
- Change request - a message sent between objects.
- Cold site - a business location that is used for backup in the event of a disruptive operational disaster at the normal business site.
- Computer forensics – forensics on a computer
- Contingency plan - A plan involving suitable backups, immediate actions and longer term measures for responding to computer emergencies such as attacks or accidental disasters. ... Also called a "disaster plan," a contingency plan must be updated periodically
- Disaster recovery – Recovery for a disaster
- Documentation – Recording what has been done
- Electronic discovery - refers to any process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a civil or criminal legal case
- Electrostatic discharge (ESD) – Discharge that can harm you from working on computers
- Exit plan – Plan for exit
- Fail closed - is when a device or system is set, either physically or via software, to shut down and prevent further operation when failure conditions are detected
- Fail open - does not shut down when failure conditions are present. Instead, the system remains “open” and operations continue as if the system were not even in place. This strategy is used when access is deemed more important that authentication
- First responder – First people to respond to an emergency
- Forensics report – Report from forensics
- Ground loop - occurs when two points of a circuit both intended to be at ground reference potential have a potential between them.
- Heating, ventilation, and air conditioning (HVAC) – Cooling and heating systems
- High availability (HA) – Availability that is high
- Hot site - a commercial disaster recovery service that allows a business to continue computer and network operations in the event of a computer or equipment disaster
- Incident - an event that is not part of normal operations that disrupts operational processes
- Incident response – Response to an incident
- Legal hold - a situation wherein a business or organization makes changes to its method of records management in order to preserve information because of a pending litigation
- Maintenance window – Windows for maintenance
- Material safety data sheet (MSDS) – Data sheet that shows safety for materials
- Memorandum of understanding (MOU) - A metric used to compute billing and/or statistics for telephone calls or other network use
- Metasploit - An open source attack framework
- Microsoft baseline security analyzer (MBSA) – Baseline security analyzer developed by Microsoft
- Multi-source agreement (MSA) – Agreement with multiple sources
- Nessus - an open-source network vulnerability scanner that uses the Common Vulnerabilities and Exposures architecture for easy cross-linking between compliant security tools
- Network access policy – Access policy for a network
- Nmap - a free and open-source network scanner
- Penetration testing (PENTEST) – testing on a device to see if it can be penetrated or not
- Recovery point objective (RPO) – Objective for recovery points
- Recovery time objective (RTO) – Objective for time points
- Risk management - the process of identifying, assessing and controlling threats to an organization's capital and earnings
- Security policy – Policy for security
- Service level agreement (SLA) – Level agreement for services
- Single point of failure – Point where the failure occurs
- Statement of work (SOW) - a document that enables offeror's to clearly understand the government's needs for the work to be done in developing or producing the goods or services to be delivered by a contractor
- Succession planning – Planning for succession
- Virtual IP – Virtual Internet Protocol
- Vulnerability management – Management for vulnerability
- Vulnerability scanner – Scanner that scans for vulnerability in your device
- Warm site - a type of facility an organization uses to recover its technology infrastructure when its primary data center goes down
Network+ Chapter 6B Power Words - Blank
Network+ Chapter 6B
- Near End Crosswalk
- Race way
- Run
- Solid Core
- Split Pair
- Punch down tool
- Wire map
- Work Area
- Patch panel
- Patch Cables
- Smart Jacks
- Stranded core –
- Solid Core
- Near End Crosswalk
- Unit
- Split Paire.
- Punch down tool
- Wire map
- Work Area
- Near End Crosswalk
Wednesday, February 26, 2020
Network+ Chapter 4A Power Words - Blank
Network + Chapter 4A
10base2
10baseFL
10baseT
802.3
BNC Connector
Bnc coupler
bridge
bridging loop
broadcast domain
CSMA/CD
collision domain
crimper
crossover cable
Ethernet
frame
frame check sequence
full duplex
half duplex
hub
MAC address
media converter
Network+ Chapter 5A Power Words - Blank
Network+ Chapter 5A Power Words
Defined
Defined
- 10GBaseER
- 10GBaseEW
- 10GBaseLR
- 10GBaseLW
- 10GBaseSR
- 10GBaseSW
- 10GBaseT .
- Gigabit Ethernet (10 GbE)
- 100Base FX
- 100BaseT
- 100BaseT4
- 100BaseTX
- 1000BaseCX
- 1000BaseLX
- 1000BaseT
- 1000BaseTX
- 1000BaseX
- 802.3ab
- 802.3z
Network+ Chapter 4B Power Words - Blank
Network Plus chapter 4 words
Defined
Defined
- Multimode
- Node
- Pad
- Ports
- Preamble
- Promiscuous mode
- Repeater
- RG 58
- RJ 45
- Segment
- Sneakernet
- Sniffer
- SAT
- STP
- Straight Though
- Switch
- T connector
- Thinnet
- TIA/EIA 568A
- TIA/EIA 568B
- Uplink Port
- UTP coupler
Network+ Chapter 2 Power Words - Blank
Chapter 2 – Network Models
Define
Define
- Network Interface Layer
- Network Layer
- Network Protocol
- Open Systems Interconnection (OSI) seven-layer model
- Organizationally Unique Identifier (OUI)
- packet
- payload
- physical address
- Physical Layer
- Presentation Layer
- protocol
- router
- segment
- Session Layer
- session software
- subnet
- switch
- TCP segment
- Transmission Control Protocol (TCP)
- Transmission Control Protocol/Internet Protocol (TCP/IP) model
- Transport Layer
- UDP datagram
- Unshielded Twisted Pair (UTP)
- User Datagram Protocol (UDP)
Thursday, February 20, 2020
Network+ Chapter 21 Power Words - Defined
Network+ Chapter 21 Power Words - Network Troubleshooting
- ARP- Address Resolution Protocol
- Arping- Uses ARP frames instead of ICMP
- Broadcast Storm- One of more devices sending nonstop broadcast frames to a network
- Butt Set- Tests if certain telephone lines can function correctly
- Cable Stripper- Supports creating UTP cables
- Cable Tester- Checks if a wire map is correct
- Certifier- Tests if a cable can handle a certain amount of capacity
- Dig- Linux command that diagnoses DNS problems
- End-to-end principle- In early days of networking, stated that apps and work only happens at endpoints in a network
- EoP- Ethernet over Power
- Hardware Tool- Tools that help configure a network
- HEC- HDMI Ethernet Channel
- Hostname- Command that displays your computer’s host name
- IEEE 1905.1- A hybrid networking standard with the goal of flexibility
- Ifconfig- UNIX command to display IP configurations
- IoT- Internet of Things
- Ip- Linux command to display IP configurations
- Ipconfig- Windows command to display IP configurations
- Light Meter- Another name for an optical power meter
- Line Tester- Checks the integrity of telephone writing
- Link Aggregation- Enables connections to work together simultaneously
- Looking Glass Site- Remote servers accessible by browser
- Multimeter- Tests voltage resistance and continuity
- Mtr- My Traceroute
- Nbtstat- Windows command that displays systems running in a network
- Netstat- Command that displays the current state of all running IP processes
- Network Appliance- Device that has to do with networking
- NIC teaming- Enables connections to work together simultaneously
- NSlookup- Windows command that diagnoses DNS problems
- nVoy- Branding for IEEE 1906.1
- Optical Power Meter- Measures the amount of light loss
- Packet Sniffer-Intercepts and logs network packets
- Pathping- Combines the commands ping and tracert
- Ping- Uses ICMP packets to query by IP or name
- Ping -6- A command used in Windows Command prompt
- Ping6- A command used in Linux and Unix command prompts
- Port Scanner- Program that probes ports on another system
- Protocol Analyzer- Monitor the different protocol
- Proxy ARP- Process of making remotely connected computers act like they are on a single LAN
- Punchdown Tool- Puts UTP wires into 66- and 110- blocks
- Route- Command that displays and edits local system routing tables
- Routing Loop- When network traffics repeats and slows down
- Snip- Synonym for cable stripper
- Speed-test Site- Used for internet connection throughput
- Switching Loop- Connecting and configuring multiple switches in a circle
- Temperature Monitor- Detects heat issues in server rooms
- Tone Generator- Backbone to a tone probe
- Tone Probe- Locates cables
- Traceroute- Traces all routers from one point to another
- Traceroute6- Displays IPv6 addresses for tracert in UNIX/Linux
- Tracert- Traces all routers from one point to another in Windows
- Tracert -6- Displays IPv6 addresses for tracert in Windows
- Voltage Event Recorder-Detects electricity issues in server rooms
- Wireshark- Popular GUI packet sniffer and analyzer
Network+ Chapter 14 Power Words - Defined
Network+ Chapter 14
Blank
Blank
- 3G: Third generation of wireless mobile telecommunications technology.
- 4G: A mobile communications standard intended to replace 3G, allowing wireless Internet access at a much higher speed.
- ADSL: Asymmetric digital subscriber line is a type of digital subscriber line technology.
- ATM: Asynchronous Transfer Mode; It is a switching technique that uses time division multiplexing for data communications.
- BRI: Basic Rate Access is an Integrated Services Digital Network configuration intended primarily for use in subscriber lines similar to those that have long been used for voice-grade telephone service.
- Baud: A common measure of symbol rate, one of the components that determine the speed of communication over a data channel.
- Baud rate: Rate at which information is transferred in a communication channel.
- B Channel: The channel that carries the main data.
- BERT: A neural network-based technique for natural language processing pre-training.
- Bridged Connection: A bridge allows you to connect two or more network segments together allowing devices to join the network when it's not possible to connect them directly to a router or switch.
- CCITT: Primary international body for fostering cooperative standards for telecommunications equipment and systems.
- Central Office: A locality to which subscriber home and business lines are connected on what is called a local loop.
- CSU/DSU: A hardware device that converts a digital data frame from the communications technology used on a local area network.
- Circuit Switching: a method of implementing a telecommunications network in which two network nodes establish a dedicated communications channel.
- CWDM: A wavelength multiplexing technology for city and access network.
- DOCSIS: An international telecommunications standard that allows for the addition of high-bandwidth data transfer to an existing coaxial cable TV system.
- dB: A relative unit of measurement corresponding to one tenth of bel.
- Dedicated Line: A communications cable or other facility dedicated to a specific application.
- D Channel: A term which refers to the ISDN channel in which the control and signaling information is carried.
- Demultiplexer: A device that takes a single input line and routes it to one of several digital output lines.
- DWDM: A technology which multiplexes a number of optical carrier signals onto a single optical fiber by using different wavelengths of laser light.
- Dial-Up Line: A telephone connection in a system of many lines shared by many users.
Wednesday, February 19, 2020
Network+ Chapter 15 Power Words - Defined
Chapter 15 - Wireless Networking
Blank
Blank
- 802.1X – IEEE Standard for port-based Network Access Control (PNAC).
- 802.11 – evolving family of specifications for wireless local area networks (WLANs) developed by a working group of the Institute of Electrical and Electronics Engineers (IEEE).
- 802.11a – an IEEE standard for transmitting data over a wireless network.
- 802.11a-ht - technical terms for mixed mode 802.11a/802.11g operation.
- 802.11b – one of several Wi-Fi standards developed by the Institute of Electrical and Electronics Engineers (IEEE).
- 802.11g – a Wi-Fi standard developed by the IEEE for transmitting data over a wireless network.
- 802.11g-ht – a Wi-Fi standard developed by the IEEE for transmitting data over a wireless network.
- 802.11i – a standard for wireless local area networks (WLANs) that provides improved encryption for networks that use the popular 802.11a, 802.11b (which includes Wi-Fi) and 802.11g standards.
- 802.11n – a Wi-Fi standard that was introduced by the IEEE in 2007 and officially published in 2009.
- Ad hoc mode – The mode of operation in a peer-to-peer wireless network, such as Wi-Fi or Bluetooth, in which computers communicate with each other rather than to a central base station (access point).
- AES – is a symmetric block cipher chosen by the U.S. government to protect classified information and is implemented in software and hardware throughout the world to encrypt sensitive data.
- Bandwidth saturation – is a phenomenon that occurs when all a circuits available bandwidth in a given direction is being utilized by a large upload or download.
- BSS – Basic Server Set.
- BSSID – Basic Server Set Identifier.
- Bounce – a method of hiding the source of a user's network connection.
- BYOD – Bring Your Own Device.
- CSMA/CA – Carrier Sense Multiple Access / Collision Avoidance.
- Channel – refers either to a physical transmission medium such as a wire, or to a logical connection over a multiplexed medium such as a radio channel in telecommunications and computer networking.
- Channel bonding – a practice commonly used in IEEE 802.11 implementations in which two adjacent channels within a given frequency band are combined to increase throughput between two or more wireless devices.
- Dead spot – a location within the coverage area of a wireless network where a signal is not received.
- Dipole Antenna – the simplest type of radio antenna, consisting of a conductive wire rod that is half the length of the maximum wavelength the antenna is to generate.
- DSSS – Direct Sequence Spread Spectrum.
- DCF – Distributed Coordination Function.
- Encryption – the process of encrypting or encoding data and messages transmitted or communicated over a computer network.
- Evil Twin – a fraudulent Wi-Fi access point that appears to be legitimate but is set up to eavesdrop on wireless communications.
- ESS – Extended Service Set.
- ESSID – Extended Service Set Identifier.
- EAP – Extendable Authentication Protocol.
- FHSS – Frequency Hopping Spread Spectrum.
- Gain – the ratio of an output power to an input power.
- Greenfield Mode – an operational mode of an 802.11n network that can maximize the speed of data transfers.
- IBSS – Independent Basic Service Set.
- Infrastructure Mode – an 802.11 networking framework in which devices communicate with each other by first going through an Access Point (AP).
- IFG – Interframe Gap.
- Latency – is the amount of time a message takes to traverse a system.
- Legacy Mode – is the generic name assigned to any old network, which is rarely used today and not part of the TCP/IP protocol suite.
- Link State – is a complex routing technique in which each router shares information with other routers about the reachability of other networks and the metric to reach the other networks in order to determine the best path.
- MAC addressing filtering – a security access control method whereby the MAC address assigned to each network card is used to determine access to the network.
- Mixed Mode – an operational mode of an 802.11n network that can maximize the speed of data transfers.
- MIMO – Multiple in Multiple Out.
- NAS – Network Access Server.
- Network Name – a text string that devices use to reference a particular computer network.
- OFDM – Orthogonal Frequency Division Multiplexing.
- Peer-to-peer mode – computer systems which are connected to each other via the Internet.
- PAN – Personal Area Network.
- PCF – Point Coordination Function.
- Point-to-multipoint – communication which is accomplished via a distinct type of one-to-many connection, providing multiple paths from a single location to multiple locations.
- Point-to-point – communication which is accomplished via a distinct type of one-to-many connection, providing multiple paths from a single location to multiple locations.
- PoE – Power over Ethernet.
- RFI – Radio Frequency Interference.
- RADIUS server – a client/server protocol and software that enables remote access servers to communicate with a central server to authenticate dial-in users and authorize their access to the requested system or service.
- Roaming – the ability for a customer of mobile communications to automatically make and receive telephone calls, send and receive data, or access other services while travelling outside the geographical coverage area of the home network, by means of using a network of another operator.
- Rouge AP – an access point that has been installed on a secure network without explicit authorization from a system administrator.
- SSID – Service Set Identifier.
- Signal Strength – the magnitude of an electric field at a reference point, which is located at a significant distance from the transmitting antenna. This is expressed in terms of the signal power of the receiver or the voltage per length received by the reference antenna.
- Site Survey – the process of planning and designing a wireless network, to provide a wireless solution that will deliver the required wireless coverage, data rates, network capacity, roaming capability and Quality of Service.
- SSID broadcast – the name of your wireless network.
- Supplicant – an entity at one end of a point-to-point LAN segment that seeks to be authenticated by an authenticator attached to the other end of that link.
- TKIP – Temporal Key Integrity Program.
- Thick client – full-featured computers that are connected to a network.
- Thin Client – a client designed to be especially small so that the bulk of the data processing occurs on the server.
- Transmit beamforming – a technique that focuses a wireless signal towards a specific receiving device, rather than having the signal spread in all directions from a broadcast antenna, as it normally would.
- Unidirectional antenna – Basically give off bad signals.
- VLAN pooling – a feature that enables you to group multiple wireless controller VLANs to form a VLAN pool.
- Wi-Fi – an abbreviation for wireless fidelity.
- Wi-Fi analyzer – a useful software application that can tell you many things about your wireless network and the networks around you, helping you optimize your Wi-Fi for best performance.
- WPA – Wi-Fi Protected Access.
- WPA2 – Wi Fi Protected Access 2.
- WPS – Wi-Fi Protected Setup.
- WEP – Wired Equivalent Privacy.
- WAP – Wireless Access Point.
- Wireless analyzer – a useful software application that can tell you many things about your wireless network and the networks around you, helping you optimize your Wi-Fi for best performance.
- Wireless bridge – A device that connects two LAN segments together via infrared or microwave transmission.
- Wireless controller – used in combination with the Lightweight Access Point Protocol to manage light-weight access points in large quantities by the network administrator or network operations center.
- WLAN – Wireless LAN.
- Wireless Network – a computer network that uses wireless data connections between network nodes.
- Wireless Survey tool – a physical survey of the premises where the wireless network will be installed.
- WPA2-Enterprise – is the security method added to WPA for wireless networks that provides stronger data protection and network access control.
Subscribe to:
Posts (Atom)