Flashcards in NETWORK+ Terms T's Deck (38):
T1 lines are a form of TCarrier
lines that offer transmission
speeds of 1.544Mbps. E1 refers to
the European equivalent of T1. See
T3 carrier lines offer transmission
speeds of up to
44.736Mbps, using 672 64Kbps B
channels. See also T-carrier
A security protocol designed
to provide centralized validation of
users who are attempting to gain
access to a router or Network
Access Server (NAS). TACACS+ is a
set of security protocols designed to
provide authentication, authorization,
and accounting (AAA) of
remote users. TACACS uses TCP
port 49 by default.
TACACS+ (Terminal Access
Controller Access Control System
T-carrier lines are highspeed
dedicated digital lines that can
be leased from telephone companies.
T-carrier lines can support
both voice and data transmissions
and are often used to create pointto-
point private networks.
reliable data transmission communication
service that operates at the
transport layer of the OSI model.
TCP is part of the TCP/IP suite.
TCP (Transmission Control
of protocols that includes TCP and
IP. TCP/IP was originally designed
for use on large internetworks but
has now become the de facto protocol
for networks of all sizes.
TCP/IP (Transmission Control
A socket, or connection
to an endpoint, used in
TCP/IP communication transmissions.
Divides a single communication
channel into multiple channels,
enabling data signals to be transferred
simultaneously as subchannels
in one communication channel. Despite being only a single channel,
data signals take turns sending data.
TDM (Time-Division Multiplexing)
A device used to test copper cables
to determine whether and where a
break is on the cable. For optical
cables, an optical TDR is used.
TDR (time-domain reflectometer)
A standard terminal emulation
protocol in the TCP/IP stack.
Telnet is used to perform terminal
emulation over TCP/IP via remote
terminal connections, enabling users
to log in to remote systems and use
resources as if they were connected
to a local system.
used to monitor temperature typically
in a server room or wiring
A service on
Windows Server platforms that
enables clients to connect to the
server as if it were a multiuser operating
system. All the processing for
the client session is performed on
the server. Only screen updates and
user input are transmitted across the
A simplified version of FTP that
enables file transfers but does not
offer any security or file management
capabilities. TFTP uses
TCP/IP port 69.
TFTP (Trivial File Transfer Protocol)
The thick cable most
commonly used as the backbone of a
coaxial network. It is approximately
.375 inches in diameter.
The IEEE 802.3
standard 10Base5, which describes
Ethernet networking using thick
coaxial cabling. Also called
An application run from
a back-end server system such as
Microsoft Terminal Services. The
processing tasks are all performed at
the terminal server rather than on
the client. In basic usage, only
screen updates are sent from the
terminal server, and only keyboard
and mouse data is sent to the terminal
Cable that is thinner
than thick coaxial cable but still
about .25 inches in diameter. It is
commonly used in older bus topologies.
The 802.3a standard
10Base2, which describes Ethernet
networking using thin coaxial
cabling. Also called ThinNet
A device used to
test the actual data throughput of a
An organization that,
along with the Electronic Industries
Association (EIA), develops standards
for telecommunications technologies.
TIA (Telecommunications Industry
Designed to address the
shortcomings of the WEP security
protocol. TKIP is an encryption
protocol defined in IEEE 802.11i.
TKIP (Temporal Key Integrity
A digital communication
line used in WANs. Commonly
used T designations are T1 (Trunk Level 1) and T3 (Trunk Level 3). It
is also possible to use only part of a
T1 line, which is known as fractional
T1. T1 lines support a data transmission
rate of up to 1.544 Mbps.
security protocol designed to ensure
privacy between communicating
client/server applications. When a
server and client communicate, TLS
ensures that no one can eavesdrop
and intercept or otherwise tamper
with the data message. TLS is the
successor to SSL.
TLS (Transport Layer Security)
A frame that provides controlling
information. In a token ring
network, the node that possesses the
token is the one that is allowed to
token-passing LAN topology
defined by IEEE standard 802.5. It
operates at either 4Mbps or 16Mbps
in a star topology.
an ISA or Microchannel device with
4Mbps or 16Mbps transfer capability
used to connect nodes to a token
token ring adapter
A device used with
a tone locator to locate and diagnose
problems with twisted-pair
cabling. Commonly referred to as
fox and hound.
A network tool used
to locate the ends of a run of network
The shape or layout of a
physical network and the flow of data
through the network. See also logical
topology and physical topology.
A function of the
TCP/IP suite, implemented in utilities
such as traceroute and tracert,
which enables the entire path of a
packet to be tracked between source
and destination hosts. It is used as a
A Windows command-line
utility used to track the route a data
packet takes to get to its destination.
To send data using light,
electronic, or electric signals. In
networking, this is usually done in
the form of digital signals composed
A situation in
which the bridges on a network tell
each other which ports on the
bridge should be opened and closed,
which ports should be forwarding
packets, and which ports should be
blocking packets—all without the
assistance of any other device.
Layer 4 of the OSI
model. Protocols at this layer perform
functions such as segmenting
data so that it can be sent over the
network and then reassembling the
segmented data on the receiving
end. The transport layer also deals
with some of the errors that can
occur in a stream of data, such as
dropped and duplicated packets.
protocol responsible for establishing
a connection and ensuring
that all data has arrived safely. It is
defined in Layer 4 of the OSI
A type of program that
appears legitimate but performs
some illicit activity when it is run.
assigned to a packet of data to prevent
it from moving around the network
indefinitely. The TTL value is
decremented each time the packet
crosses a router, until it reaches 0, at
which point it is removed from the
TTL (Time To Live)