ICND 1

CISCO ICND1

CISCO ICND1


Set of flashcards Details

Flashcards 162
Language Deutsch
Category Computer Science
Level Vocational School
Created / Updated 22.11.2017 / 29.03.2024
Weblink
https://card2brain.ch/box/20171122_icnd_1
Embed
<iframe src="https://card2brain.ch/box/20171122_icnd_1/embed" width="780" height="150" scrolling="no" frameborder="0"></iframe>

RTT 

roundtrip time. Time required for a network communication to travel from the source to the destination and back. RTT includes the time required for the destination to process the message from the source and to generate a reply. RTT is used by some routing algorithms to aid in calculating optimal routes. 

SA 

source address. 

SC 

subscriber connector. 

SCP 

Secure Copy Protocol. SCP provides a secure and authenticated method for transferring files. 

SFF 

small form factor. 

SFP 

small formfactor pluggable. 

SHA256 

Secure Hash Algorithm. SHA256 is part of the SHA2 set of cryptographic hash functions. 

SLA 

SiteLevel Aggregator. 

SLAAC 

stateless address autoconfiguration. Allows IPv6 hosts to automatically acquire a valid IPv6 address when connected to an IPv6 network using the Neighbor Discovery Protocol. 

SMF 

singlemode fiber. Fiberoptic cabling with a narrow core that allows light to enter only at a single angle. Such cabling has higher bandwidth than multimode fiber, but requires a light source with a narrow spectral width (for example, a laser). Also called monomode fiber. 

SNMP 

Simple Network Management Protocol. Network management protocol used almost exclusively in TCP/IP networks. SNMP provides a means to monitor and control network devices, and to manage configurations, statistics collection, performance, and security. 

SPF 

shortest path first. Routing algorithm that iterates on length of path to determine a shortestpath spanning tree. Commonly used in linkstate routing algorithms. Sometimes called Dijkstra's algorithm. 

SSH 

Secure Shell Protocol. Protocol that provides a secure remote connection to a route through a TCP application. 

SSHv1 

Secure Shell Protocol version 1. 

SSHv2 

Secure Shell Protocol version 2. 

SSL 

Secure Socket Layer. Encryption technology for the Web used to provide secure transactions, such as the transmission of credit card numbers for ecommerce. 

ST 

straight tip. 

static route 

Route that is explicitly configured and entered into the routing table. Static routes take precedence over routes chosen by dynamic routing protocols. 

STP 

Spanning Tree Protocol. Bridge protocol that uses the spanningtree algorithm, enabling a learning bridge to dynamically work around loops in a network topology by creating a spanning tree. Bridges exchange BPDU messages with other bridges to detect loops, and then remove the loops by shutting down selected bridge interfaces. Refers to both the IEEE 802.1 Spanning Tree Protocol standard and the earlier Digital Equipment Corporation Spanning Tree Protocol upon which it is based. The IEEE version supports bridge domains and allows the bridge to construct a loopfree topology across an extended LAN. The IEEE version generally is preferred over the Digital version. 

subnet mask 

A 32bit binary number that is used to define which portion of an IP address refers to the subnet and which portion refers to the host. Sometimes referred to simply as mask. 

SVI 

switch virtual interface. 

SYN 

synchronization. 

SYNACK 

synchronizationacknowledgment. 

syslog 

system logging. 

Telnet 

standard terminal emulation protocol in the TCP/IP protocol stack. Telnet is used for remote terminal connection, enabling users to log into remote systems and use resources as if they were connected to a local system. Telnet is defined in RFC 854. 

TIA 

Telecommunications Industry Alliance. Organization that develops standards relating to telecommunications technologies. Together, the TIA and the EIA have formalized standards, such as EIA/TIA232, for the electrical characteristics of data transmission. 

TLS 

Transport Layer Security. A future IETF protocol to replace SSL. 

TLV 

type, length, value. 

Token Ring 

Tokenpassing LAN that was developed and supported by IBM. Token Ring runs at 4 or 16 Mbps over a ring topology. Similar to IEEE 802.5. 

ToS

type of service 

TTL 

Time to Live. A mechanism that limits the lifespan or lifetime of data in a computer or network. 

UDI 

unique device identifier. 

UPS 

uninterruptible power supply. 

UTC 

Coordinated Universal Time. Time zone at zero degrees longitude. Formerly called Greenwich Mean Time (GMT) and Zulu time. 

UTP 

unshielded twistedpair. Fourpair wire medium used in a variety of networks. UTP does not require the fixed spacing between connections that is necessary with coaxialtype connections. Five types of UTP cabling are commonly used: Category 1, Category 2, Category 3, Category 4, and Category 5. 

VID 

VLAN ID. The identification of the VLAN, which is used by the standard IEEE 802.1Q. Being 12 bits, it allows for the identification of 4096 VLANs. 

VLAN 

virtual LAN. Group of devices on one or more LANs that are configured (using management software) so that they can communicate as if they were attached to the same wire, when in fact they are located on a number of different LAN segments. Because VLANs are based on logical instead of physical connections, they are extremely flexible. 

VLSM 

variablelength subnet mask. Capability to specify a different subnet mask for the same network number on different subnets. VLSM can help optimize available address space. 

WAP 

wireless access point. 

WiMAX 

Worldwide Interoperability for Microwave Access (WiMAX) is a family of wireless communications standards designed to provide up to 1 Gbit/s data rates.