Vocab List - Module 2 Flashcards
Module 2 (500 cards)
it is an address family that is used to identify routing sessions for protocols that use standard IP version 4 address prefixes, such as BGP. In the IPv4 address family:
Unicast or multicast address prefixes can be specified.
Unicast routing information is advertised by default when a BGP peer is configured unless the advertisement of unicast IPv4 information is explicitly turned off.
IPv4 (Internet Protocol version 4)
A new packet structure that has 128-bit source and destination IP addresses, which are four times larger than the current Ipv4. _______ also provides for a simplified header format and supports time-dependent traffic for use with voice and video that require specified bandwidth. _____ is also extensible to provide for additional headers if needed.
IPv6
It is an older communication protocol used to interconnect clients and servers on a Novell NetWare operating system environment. _____ is a connectionless packet protocol that operates at the Network layer of communication. SPX is a transport layer protocol that sits on top of the IPX layer providing connection- oriented services between network nodes.
IPX/SPX (Internetwork Packet Exchange/Sequenced Packet Exchange)
A physical line that devices use to send signals to the processor when they want to send or receive information.
IRQ (Interrupt Request Line)
This organization has the responsibility to coordinate all TCP/IP-related research projects.
IRTF (Internet Research Task Force)
It is a network protocol that encapsulates storage device communication data into IP packets for transmission over an Ethernet connection allowing IP- connected hosts to access a Storage Area Network (SAN). iSCSI provides the benefits of a FC SAN without the cost of fibre channel hardware. Using Ethernet and iSCSI, you can create a very powerful, very fast SAN using off- the-shelf, commodity-grade Ethernet hardware such as Cat5/5e cabling and Ethernet switches.
ISCSI
It is another alternative to traditional dial-up that can be used to connect to the Internet or to directly communicate with another computer connected to the ISDN network. ISDN is more common in Europe than in the U.S. ISDN can use regular telephone wiring, but must be connected to a special ISDN network.
Levels of ISDN service include:
BRI (Basic Rate Interface):
2 64-Kbps bearer (B) channels can transfer data up to 128 Kbps. Only one B channel is used during phone use.
1 16-Kbps delta (D) channel for connection control.
PRI (Primary Rate Interface):
23 B channels (each at 64 Kbps) for data transmission. 1 D channel (at 64 Kbps) for connection control.
ISDN (Integrated Services Digital Network)
Intermediate System to Intermediate System (IS-IS) is an OSI-based link-state routing protocol.
IS-IS (Intermediate System to Intermediate System)
A global organization created in 1992. Responsible for the internetworking technologies and applications of the Internet. It is also responsible for the further development of the standards and protocols that allow the Internet to function.
ISOC (Internet Society)
An ISP (Internet service provider) is a company that provides Internet access and other web related services.
ISP (Internet service provider)
A domain controller whose Knowledge Consistency Checker (KCC) establishes inbound intersite Connection objects for all bridgehead servers in a site.
ISTG (Intersite Topology Generator)
A committee that has set most standards related to modems since the late 1980s.
ITU (International Telecommunications Union)
Exchange 2007’s database engine is referred to as the Extensible Storage Engine (ESE). ESE is a transactional database that writes information into RAM memory and into a log file. Once it is in the log file, it will be written to disk.
There are a number of files used to store information:
.JRS file
A programming language designed to let programmers create applications for the Internet. Java applications do not depend on a particular operating system or hardware platform to run.
Java
Journaling is the ability to record and retain all communications in an organization.
Journaling
A process that runs on each domain controller and creates inbound Connection objects (almost always intrasite Connection objects).
Keepalive messages act as hello packets to ensure that routers are still responsive.
KCC (Knowledge Consistenc Checker)
Keepalive messages
It is an authentication encryption protocol designed to provide security for the initial logon process and service requests. Kerberos uses symmetric key cryptography, employs DES, and provides end-to-end security.
Kerberos
A privileged operating mode for the operating system files and processes that interact directly with the computer’s hardware.
Kernel mode
A part of the Registry. Keys appear as folders in the Registry window and can contain subkeys and values.
Key
A process that runs on each domain controller and creates inbound Connection objects (almost always intrasite Connection objects).
Knowledge Consistency Checker (KCC)
L2F is a VPN protocol which offers no data encryption.
L2F was combined with PPTP, creating L2TP. Support for IPSec was added, and the result is a very versatile, nearly universally interoperable VPN protocol that provides solid authentication and reliable data encryption.
L2F (Layer 2 Forwarding Protocol)
It is (Layer 2 Tunneling Protocol) is the VPN protocol that typically employs IPSec as its data encryption mechanism.
It is the recommended VPN protocol to use on dial-up VPN connections.
L2TP (Layer Two Tunneling Protocol)
A group of closely located computers or peripherals connected so that they can interact with each other as a network.
LAN (Local area network)
A Data Link layer protocol called Link Access Procedure for Modems (LAPM) used by newer modems for error detection. LAPM is implemented in the modem hardware. LAPM is described by ITU’s V.42 standard.
LAPM (Link Access Procedure for Modems)