Вы находитесь на странице: 1из 3

Complete a Glossary for the following terms briefly explaining each abbreviation Network protocols. 1.

TCP/IP This is an internet protocol 2. IPX/SPX IPX is a network layer protocol and SPX is a transport layer protocol, it is similar to TCP/IP and was designed for LANs 3. NetBEUI This converts computer names to IP Address and is used in small networks using older operating systems 4. AppleTalk This is a set of protocols specifically for apple computers TCP/IP protocols. 5. IP 6. TCP 7. UDP Transmission Control Protocol o This check that all packets have arrived and has large overheads User Datagram Protocol o This is used for such things as streaming data, it has low overheads and is connectionless Internet Control Message Protocol o If there is a problem with the connection, error and status messages regarding the connection are sent using ICMP, which is part of the Internet protocol. Address Resolution Protocol o This maps an IP address to a MAC Address Network Time Protocol o This is used to synchronise clocks between computer systems Internet Protocol o This moves the data packets between nodes

8. ICMP

9. ARP 10. NTP

Network services. 11. DHCP Dynamic Host Configuration Protocol o Used to allocate and manage IP addresses 12. BOOTP Bootstrap Protocol o Used to obtain an IP address from a configuration server. 13. DNS Domain Name System o This converts IP Addresses into web addresses and vice versa

14. NAT

Network Address Translation o This is usually used by the router to translate IP addresses on a local network to a single IP Address to allow for information to pass through the internet Internet Connection Sharing o This allows many computers to connect to the internet using the same internet connection and the same IP Address Windows Internet Name Service o This manages the association of workstation names and their locations with IP addresses without anyone being involved in any configuration change

15. ICS

16. WINS

17. SNMP Simple Network Management Protocol o This is used to configure managed devices such as a router WAN technologies. 18. Packet switching, o This is a method of breaking data files into small packets or chunks in order to send them across a network 19. Circuit switching, o This is a dedicated connection between points and nothing else can use the connection 20. ISDN Integrated Services Digital Network o This is a group of communication standards that allows the transmission of digital voice, video and data over a public switched telephone line 21. FDDI Fibre Distributed Data Interface o This is a set of protocols for sending digital data over fibre optic cable 22. ATM Asynchronous Transfer Mode o This is a network technology that sends data in cells or packets of a fixed size and sends video audio and data without any one bit of data getting priority 23. T1/E1 T1 is a digital carrier signal used in North America and has a data rate of about 1.544 megabits / second. E1 is similar and is used in Europe and has a data rate of about 2 megabits /second 24. T3/E3 T3 is a dedicated phone connection supporting data rates of about 43 Mbps E3 is the European equivalent of a T3 circuit supporting data rates of about 34 Mbps 25. OCx Optical Carrier levels o The rate of transmitting digital signals over a fibre optic cable 26. Frame Relay o This is an example of Packet switching and operates at the physical and data link layers of the OSI model 27. Sonet/SDH Synchronous Optical Networking / Synchronous Digital Hierarchy

These are protocols for the transfer of digital bit streams over fibre optic cable using lasers.

Network security. 28. IPsec

Internet Protocol Security o This is a protocol for securing IP communications by authentication and encryption of each IP packet Layer 2 Tunnelling Protocol o This is used to support VPNs it does not provide confidentiality or strong authentication and is usually used along with IPsec

29. L2TP

30. SSL Secure Sockets Layer o This is an encryption that allows for secure transmission of data over the internet 31. Kerberos o This is a network authentication protocol and provides strong encryption by using secret key encryption

Remote access. 32. RAS Remote Access Service o This is a combination of software and hardware to allow users to access local network services from a remote location Point-to-Point Protocol o This is used to establish a direct connections between two networking nodes Point-to-Point Tunnelling Protocol o This is used to extend corporate networks over public internet (VPNs) Layer 2 Tunnelling Protocol o This is used to support VPNs it does not provide confidentiality or strong authentication and is usually used along with IPsec

33. PPP 34. PPTP 35. L2TP

36. ICA Independent Computing Architecture o This is a proprietary protocol for an application server system, designed by Citrix Systems

Вам также может понравиться