NETWORK+ Terms T's Flashcards Preview

NETWORK+ Terms > NETWORK+ Terms T's > Flashcards

Flashcards in NETWORK+ Terms T's Deck (38):
1

T1 lines are a form of TCarrier
lines that offer transmission
speeds of 1.544Mbps. E1 refers to
the European equivalent of T1. See
also T-carrier.

T1/E1

2

T3 carrier lines offer transmission
speeds of up to
44.736Mbps, using 672 64Kbps B
channels. See also T-carrier

T3/E3

3

A security protocol designed
to provide centralized validation of
users who are attempting to gain
access to a router or Network
Access Server (NAS). TACACS+ is a
set of security protocols designed to
provide authentication, authorization,
and accounting (AAA) of
remote users. TACACS uses TCP
port 49 by default.

TACACS+ (Terminal Access
Controller Access Control System
Plus)

4

T-carrier lines are highspeed
dedicated digital lines that can
be leased from telephone companies.
T-carrier lines can support
both voice and data transmissions
and are often used to create pointto-
point private networks.

T-carrier

5

A connection-oriented,
reliable data transmission communication
service that operates at the
transport layer of the OSI model.
TCP is part of the TCP/IP suite.

TCP (Transmission Control
Protocol)

6

A suite
of protocols that includes TCP and
IP. TCP/IP was originally designed
for use on large internetworks but
has now become the de facto protocol
for networks of all sizes.

TCP/IP (Transmission Control
Protocol/Internet Protocol)

7

A socket, or connection
to an endpoint, used in
TCP/IP communication transmissions.

TCP/IP socket

8

Divides a single communication
channel into multiple channels,
enabling data signals to be transferred
simultaneously as subchannels
in one communication channel. Despite being only a single channel,
data signals take turns sending data.

TDM (Time-Division Multiplexing)

9

A device used to test copper cables
to determine whether and where a
break is on the cable. For optical
cables, an optical TDR is used.

TDR (time-domain reflectometer)

10

A standard terminal emulation
protocol in the TCP/IP stack.
Telnet is used to perform terminal
emulation over TCP/IP via remote
terminal connections, enabling users
to log in to remote systems and use
resources as if they were connected
to a local system.

Telnet

11

A device
used to monitor temperature typically
in a server room or wiring
closet.

temperature monitor

12

A service on
Windows Server platforms that
enables clients to connect to the
server as if it were a multiuser operating
system. All the processing for
the client session is performed on
the server. Only screen updates and
user input are transmitted across the
network connection.

Terminal Services

13

A simplified version of FTP that
enables file transfers but does not
offer any security or file management
capabilities. TFTP uses
TCP/IP port 69.

TFTP (Trivial File Transfer Protocol)

14

The thick cable most
commonly used as the backbone of a
coaxial network. It is approximately
.375 inches in diameter.

thick coaxial

15

The IEEE 802.3
standard 10Base5, which describes
Ethernet networking using thick
coaxial cabling. Also called
ThickNet.

thick Ethernet

16

An application run from
a back-end server system such as
Microsoft Terminal Services. The
processing tasks are all performed at
the terminal server rather than on
the client. In basic usage, only
screen updates are sent from the
terminal server, and only keyboard
and mouse data is sent to the terminal
server.

thin client

17

Cable that is thinner
than thick coaxial cable but still
about .25 inches in diameter. It is
commonly used in older bus topologies.

thin coaxial

18

The 802.3a standard
10Base2, which describes Ethernet
networking using thin coaxial
cabling. Also called ThinNet

thin Ethernet

19

A device used to
test the actual data throughput of a
network cable.

throughput tester

20

An organization that,
along with the Electronic Industries
Association (EIA), develops standards
for telecommunications technologies.

TIA (Telecommunications Industry
Association)

21

Designed to address the
shortcomings of the WEP security
protocol. TKIP is an encryption
protocol defined in IEEE 802.11i.

TKIP (Temporal Key Integrity
Protocol)

22

A digital communication
line used in WANs. Commonly
used T designations are T1 (Trunk Level 1) and T3 (Trunk Level 3). It
is also possible to use only part of a
T1 line, which is known as fractional
T1. T1 lines support a data transmission
rate of up to 1.544 Mbps.

T-line

23

A
security protocol designed to ensure
privacy between communicating
client/server applications. When a
server and client communicate, TLS
ensures that no one can eavesdrop
and intercept or otherwise tamper
with the data message. TLS is the
successor to SSL.

TLS (Transport Layer Security)

24

A frame that provides controlling
information. In a token ring
network, the node that possesses the
token is the one that is allowed to
transmit next.

token

25

An IBM-proprietary
token-passing LAN topology
defined by IEEE standard 802.5. It
operates at either 4Mbps or 16Mbps
in a star topology.

token ring

26

Traditionally
an ISA or Microchannel device with
4Mbps or 16Mbps transfer capability
used to connect nodes to a token
ring network

token ring adapter

27

A device used with
a tone locator to locate and diagnose
problems with twisted-pair
cabling. Commonly referred to as
fox and hound.

tone generator

28

A network tool used
to locate the ends of a run of network
cable.

toner probe

29

The shape or layout of a
physical network and the flow of data
through the network. See also logical
topology and physical topology.

topology

30

A function of the
TCP/IP suite, implemented in utilities
such as traceroute and tracert,
which enables the entire path of a
packet to be tracked between source
and destination hosts. It is used as a
troubleshooting tool.

trace route

31

A Windows command-line
utility used to track the route a data
packet takes to get to its destination.

tracert

32

To send data using light,
electronic, or electric signals. In
networking, this is usually done in
the form of digital signals composed
of bits.

transmit

33

A situation in
which the bridges on a network tell
each other which ports on the
bridge should be opened and closed,
which ports should be forwarding
packets, and which ports should be
blocking packets—all without the
assistance of any other device.

transparent bridging

34

Layer 4 of the OSI
model. Protocols at this layer perform
functions such as segmenting
data so that it can be sent over the
network and then reassembling the
segmented data on the receiving
end. The transport layer also deals
with some of the errors that can
occur in a stream of data, such as
dropped and duplicated packets.

transport layer

35

A communications
protocol responsible for establishing
a connection and ensuring
that all data has arrived safely. It is
defined in Layer 4 of the OSI
model.

transport protocol

36

A type of program that
appears legitimate but performs
some illicit activity when it is run.

Trojan

37

A value
assigned to a packet of data to prevent
it from moving around the network
indefinitely. The TTL value is
decremented each time the packet
crosses a router, until it reaches 0, at
which point it is removed from the
network.

TTL (Time To Live)

38

A type of cable that
uses multiple twisted pairs of copper
wire.

twisted pair