Internetworking Abbrev
Internetworking Abbreviation and Acronyms
Internetworking Abbreviation and Acronyms
Set of flashcards Details
Flashcards | 42 |
---|---|
Language | English |
Category | Computer Science |
Level | Primary School |
Created / Updated | 19.08.2013 / 07.01.2018 |
Weblink |
https://card2brain.ch/box/internetworking_abbrev
|
Embed |
<iframe src="https://card2brain.ch/box/internetworking_abbrev/embed" width="780" height="150" scrolling="no" frameborder="0"></iframe>
|
Create or copy sets of flashcards
With an upgrade you can create or copy an unlimited number of sets and use many more additional features.
Log in to see all the cards.
FHSS
Frequency Hopping Spread Spectrum
-> WLAN 802.11
method of transmitting radio signals by rapidly switching a carrier among many frequency channels, using a pseudorandom sequence known to both transmitter and receiver
OFDM
Orthogonal frequency-division multiplexing
WLAN method of encoding digital data on multiple carrier frequencies.
MIMO
multiple-input and multiple-output (WLAN)
multiple antennas at both the transmitter and receiver to improve communication performance
CCX
Cisco Compatible Extensions Program
--> third party WLAN Equipment Testing sponsered by Cisco
ZCF
Microsoft Zero Configuration Utility
War drivers
The attacker wants to gain Internet access for free. This person drives around, trying to find APs that have no security or weak security. The attacker
can use easily downloaded tools and high-gain directional antennas
Hacker
The motivation for hackers is to either find information or deny services.
Interestingly, the end goal may be to compromise the hosts inside the wired network, using the wireless network as a way to access the Enterprise network without having
to go through Internet connections that have firewalls.
Rogue AP
:The attacker captures packets in the existing wireless LAN, finding the SSID and cracking security keys (if they are used). Then the attacker can set up her own
AP, with the same settings, and get the Enterprise’s clients to use it. In turn, this can cause the individuals to enter their usernames and passwords, aiding in the next phase of the attacker’s plan.
ICANN (formerly IANA)
Internet Corporation for Assigned Names and Numbers
SLSM
VLSM
static length subnet masking (SLSM)
variable-length subnet masking (VLSM)
CIDR
Classless Inter-domain Routing
CSU/DSU
channel service unit/digital service unit
either outside the router or integrated into the router’s serial interface
RJ-48 Connector
CAPWAP
LWAPP
DTLS
Control And Provisioning of Wireless Access Points
Lightweight Access Point Protocol
Datagram Transport Layer Security
ISR
Integrated Services Router (Cisco Products)
NBAR
Network Based Application Recognition
NIC
Network Interface Card
Network Interface Controller (MAC)
STP
Spanning Tree Protocol
SMB
Server Message Block Protocol (Microsoft)
CIFS
Common Internet File System
IKE
Internet key exchange
LDAP
Lightweight Directory Access Protocolapplication
protocol for accessing and maintaining distributed directory information services over an IP network
SDM
Service Delivery Model
SDN
Software Defined Networking
NLB
Network Load Balancing
MAC Address
Media Access Control Address is a unique identifier assigned to network interfaces for communications on the physical network segment.
MAC addresses are used as a network address for most IEEE 802 network technologies
VSA
Vendor specific attribute
DRM
Digital Rights Management by Microsoft
NAS
Network Access Server
also network attached storage
ALG
Applicaton Layer Gateway - one per protocol in a firewall (IP, TCP, ICMP, IPSec ....)
ISO
International Stadardization Organisation
-
- 1 / 42
-