Internetworking Abbrev

Internetworking Abbreviation and Acronyms

Internetworking Abbreviation and Acronyms

Th M_

Th M_

Fichier Détails

Cartes-fiches 42
Langue English
Catégorie Informatique
Niveau École primaire
Crée / Actualisé 19.08.2013 / 07.01.2018
Lien de web
https://card2brain.ch/box/internetworking_abbrev
Intégrer
<iframe src="https://card2brain.ch/box/internetworking_abbrev/embed" width="780" height="150" scrolling="no" frameborder="0"></iframe>

NIC

Network Interface Card

Network Interface Controller (MAC)

STP

Spanning Tree Protocol

SMB

Server Message Block Protocol (Microsoft)

CIFS

Common Internet File System

IKE

Internet key exchange

LDAP

Lightweight Directory Access Protocolapplication

protocol for accessing and maintaining distributed directory information services over an IP network

SDM

Service Delivery Model

SDN

Software Defined Networking

NLB

Network Load Balancing

MAC Address

Media Access Control Address is a unique identifier assigned to network interfaces for communications on the physical network segment.

MAC addresses are used as a network address for most IEEE 802 network technologies

VSA

Vendor specific attribute

DRM

Digital Rights Management by Microsoft

NAS

Network Access Server

also network attached storage

ALG

Applicaton Layer Gateway - one per protocol in a firewall (IP, TCP, ICMP, IPSec ....)
 

ISO

International Stadardization Organisation

OSI

Open System Interconnection

URL

Universal Resource Locator (Web Address)

IEEE

Institute of Electrical and Electronics Engineers

GBIC

Gigabit Interface Converter

SFP

Small Form Pluggable (Cisco)
Small Form-factor Pluggable

umgangssprachlich auch Mini-GBIC

EIA

TIA

ITU

Electronic Industries Alliance
Telecommunications Industry Association
International Telecommunications Union

CSMA / CD

CSMA / CA

Carrier Sense Multiple Access/Collision Detection | Avoidande (WLAN)

medium idle? - yes: start transmitting
                          - no: wait
collision?
'-- yes: jam signal (minimum packet time to ensure all recivers got the collison)
  '-increment retransmission counter
   '- maximum number of transmission attempts reached? If so, abort transmission.
    '- calculate and wait random backoff period based on number of collisions
     '=> re-enter main procedure          
'=> no: Reset retransmission counters and end frame transmission.

half duplex, full duplex

half: deviece eihter send OR receives

full: single attached device => no collision
 => disable CSMA/CD
 => send AND receive

e.g.

Latin "exempli gratia"

TDM

PCM

Time Division Multiplexing

Puls Code Modulation
'- analog voice to digital signal
'-- 8000 samples per sconds by 8 bit code => 64kbps

VA

Voice Adapter

ASIC

Application specific integrated circuit

FHSS

Frequency Hopping Spread Spectrum

-> WLAN 802.11

method of transmitting radio signals by rapidly switching a carrier among many frequency channels, using a pseudorandom sequence known to both transmitter and receiver

OFDM

Orthogonal frequency-division multiplexing

WLAN method of encoding digital data on multiple carrier frequencies.

MIMO

multiple-input and multiple-output (WLAN)

multiple antennas at both the transmitter and receiver to improve communication performance

CCX

Cisco Compatible Extensions Program

--> third party WLAN Equipment Testing sponsered by Cisco

ZCF

Microsoft Zero Configuration Utility

War drivers

The attacker wants to gain Internet access for free. This person drives around, trying to find APs that have no security or weak security. The attacker
can use easily downloaded tools and high-gain directional antennas

Hacker

The motivation for hackers is to either find information or deny services.
Interestingly, the end goal may be to compromise the hosts inside the wired network, using the wireless network as a way to access the Enterprise network without having
to go through Internet connections that have firewalls.

Rogue AP

:The attacker captures packets in the existing wireless LAN, finding the SSID and cracking security keys (if they are used). Then the attacker can set up her own
AP, with the same settings, and get the Enterprise’s clients to use it. In turn, this can cause the individuals to enter their usernames and passwords, aiding in the next phase of the attacker’s plan.

ICANN (formerly IANA)

Internet Corporation for Assigned Names and Numbers

SLSM

VLSM

static length subnet masking (SLSM)

variable-length subnet masking (VLSM)

CIDR

Classless Inter-domain Routing

CSU/DSU

channel service unit/digital service unit

either outside the router or integrated into the router’s serial interface

RJ-48 Connector

CAPWAP

LWAPP

DTLS

Control And Provisioning of Wireless Access Points

Lightweight Access Point Protocol

Datagram Transport Layer Security