Copy of `Wild Packets - Networking terms`
The wordlist doesn't exist anymore, or, the website doesn't exist anymore. On this page you can find a copy of the original information. The information may have been taken offline because it is outdated.
|
|
Wild Packets - Networking terms
Category: Agriculture and Industry > Networking terms
Date & country: 24/02/2017, USA Words: 1152
|
SpikeA sudden and transient increase in the voltage from a power supply.
SPXSequential Packet Exchange. A Transport layer protocol developed by Novell to provide in-sequence data transfer.
SQLStructured Query Language. A widely used metalanguage for data base access and management. AN IBM and ANSI standard.
Square waveAn electromagnetic wave that oscillates between two voltage states, theoretically requiring no time to accomplish a state transition.
Standard1. A synonym for specification. 2. A component or way of accomplishing a task that is so frequently and widely used that is seems to be part of a specification.
Standby MonitorDevice placed in standby mode on a Token Ring network in case an active monitor fails. See also active monitor and ring monitor.
StarA network topology that is constructed by connecting computing devices to a common device.
Star TopologyLAN topology in which end points on a network are connected to a common central switch by point-to-point links. A ring topology that is organized as a star implements a unidirectional closed-loop star, instead of point-to-point links. Compare with bus topology, ring topology, and tree topology.
StarLANCSMA/CD LAN, based on IEEE 802.3, developed by AT&T.
Static RouteRoute that is explicitly configured and entered into the routing table. Static Routes take precedence over routes chosen by dynamic routing protocols.
Statistical Multiplexing Technique in which information from multiple logical channels can be transmitted across a single physical channel. Statistical multiplexing dynamically allocates bandwidth only to active input channels, making better use of available bandwidth and allowing more devices to be connected than with other multiplexing techniques. Also referred to as statistical time-division multiplexing or stat mux.
STM-1Synchronous Transport Module level 1. One of a number of SDH formats that specifies the frame structure for the 155.52-Mbps lines used to carry ATM cells.
Store And Forward Packet SwitchingPacket-switching technique in which frames are completely processed before being forwarded out the appropriate port. This processing includes calculating the CRC and checking the destination address. In addition, frames must be temporarily stored until network resources are available to forward the message.
STPShielded twisted-pair. Two-pair wiring medium used in a variety of network implementations. STP cabling has a layer of shielded insulation to reduce EMI.
STS-1Synchronous Transport Signal level 1. Basic building block signal of SONET, operating at 51.84 Mbps. Faster SONET rates are defined as STS-n, where n is a multiple of 51.84 Mbps.
STS-3cSynchronous Transport Signal level 3, concatenated. SONET format that specifies the frame structure for the 155.52-Mbps lines used to carry ATM cells.
Stub AreaOSPF area that carries a default route, intra-area routes, and interarea routes, but does not carry external routes. Virtual links cannot be configured across a stub area, and they cannot contain as ASBR.
Stub NetworkNetwork that has only a single connection to a router.
SubareaPortion of an SNA network that consists of a subarea node and any attached links and peripheral nodes.
Subarea NodeSNA communication controller or host that handles complete network addresses.
SubchannelIn broadband terminology, a frequency-based subdivision creating a separate communications channel.
SubinterfaceOne of a number of virtual interfaces on a single physical interface.
Subnet AddressPortion of an IP address that is specified as the subnetwork by the subnet mask. See also IP address, subnet mask, and subnetwork.
Subnet MaskA representation of a user's Internet address where all of the bit positions corresponding to the user's network and subnetwork id are 1's and the bit corresponding to the user's host id are 0's.
Subnetwork1. In IP networks, a network sharing a particular subnet address. Subnetworks are networks arbitrarily segmented by a network administrator in order to provide a multilevel, hierarchical routing structure while shielding the subnetwork from the addressing complexity of attached networks. Sometimes called a subnet.
SubvectorA data segment of a vector in an SNA message. A subvector consists of a length field, a key that describes the subvector type, and subvector specific data.
SURAnetSoutheastern Universities Research Association Network. Network connecting universities and other organizations in the Southeastern United States. SURAnet, originally funded by the NSF and a part of the NSFNET, is now part of BBN Planet.
SVCSwitched virtual circuit. Virtual circuit that is dynamically established on demand and is torn down when transmission is complete. SVCs are used in situations where data transmission is sporadic. Called a switched virtual connection in ATM terminology.
SwitchA switch is a device that forwards packets between nodes based on the packet's destination node address (either hardware or protocol), typically with a buffer time longer than a repeater but shorter than the transmission time of the packet.
Switched 56A dial-up communication service available from a telephone service provider that offers a fractional portion of a T1 line built from as many as 24 channels of 56 KBPS each. Also called Fractional T1.
Switched LANLAN implemented with LAN switches.
SynchronizationEstablishment of common timing between sender and receiver.
SynchronousA communication system where stations may only transmit at prescribed intervals and must provide a timing pulse with their packet.
SynchronousTerm describing digital signals that are transmitted with
SysgenSystem generation. Process of defining network resources in a network.
SystemAny computer system that can be controlled by a user consisting of a CPU and optional equipment such as display monitors, disk drives, and other peripherals.
Systemcollectively to the proprietary protocols and network file systemsthat computers use to exchange data with their LAN Servers.
System FileThe Macintosh file that contains system software for the Macintosh OS, including patches or replacements to obsolete code contained in ROM.
System FolderThe directory in which the System File resides.
System ManagementActivities that focus on the care and management of individual computer systems.
System SoftwareSoftware in a computing system that provides basic functionality like file management, visual display, and keyboard input and is used by application software to accomplish these functions.
TACTerminal Access Controller. Internet host that accepts terminal connections from dial-up lines.
TACACSTerminal Access Controller Access Control System. Authentication protocol, developed by the DDN community, that provides remote access authentication and related services, such as event logging. User passwords are administered in a central database rather than in individual routers, providing an easilyscalable network security solution.
Tagged TrafficATM cells that have their CLP bit set to 1. If the network is congested, tagged traffic can be dropped to ensure deliver of higher-priority traffic. Sometimes called DE (discard eligible) traffic.
TapAn intrusion into a network cable by a connector.
Task1) Synonym for process. 2) An activity or group of activities necessary to accomplish a goal.
TAXI 4B/5BTransparent Asynchronous Transmitter/Receiver Interface 4-byte/5-byte. Encoding scheme used for FDDI LANs, as well as for ATM. Supports speeds of up to 100 Mbps over multimode fiber. TASI is the chipset that generates 4B/5B encoding on multimode fiber.
TCPTransmission Control Protocol. A reliable Transport Layer Protocol for managing IP that supports re-transmission, sequencing and fragmentation.
TCP/IPTransmission Control Protocol/Internet Protocol. A Transport and Network Layer Protocol, respectively, used by a large number of computers.
TCUTrunk coupling unit. In Token Ring networks, a physical device that enables a station to connect to the trunk cable.
TDMTime-division multiplexing. Technique in which information from multiple channels can be allocated bandwidth on a single wire based on preassigned time slots. Bandwidth is allocated to each channel regardless of whether the station has data to transmit.
TDRTime domain reflectometer. Device capable of sending signals through a network medium to check cable continuity and other attributes. TDRs are used to find physical layer network problems.
TelcoAbbreviation for telephone company.
TelecommunicationsThe system of technologies used in telephone communications.
TelephonyThe science and practice of telecommunications.
TelexTeletypewriter service allowing subscribers to send messages over the PSTN.
TelnetA process to access a remote computer system, often a Unix system, over the network. Origin: Teletype Network.
TempestU.S. military standard. Electronic products adhering to the Tempest specifications are designed to withstand EMP.
TERENATrans-European Research and Education Networking Association. Organization that promotes information and telecommunications technologies development in Europe. Formed by the merging of EARN and RARE.
TermidSNA cluster controller identification. Termid is meaningful only for switched lines. Also called Xid.
TerminalSimple device at which data can be entered or retrieved from a network. Generally, terminals have a monitor and a keyboard, but no processor or local disk drive.
Terminal AdapterDevice used to connect ISDN BRI connections to existing interfaces such as EIA/TIA-232. Essentially, an ISDN modem.
Terminal EmulationA computing activity in which a computer runs an application and communicates with a host as if it were a terminal such as a DEC VT220.
Terminal ServerCommunications processor that connects asynchronous devices such as terminals, printers, hosts, and modems to any LAN or WAN that uses TCP/IP, X.25, or LAT protocols. Terminal servers provide the internetwork intelligence that is not available in the connected devices.
TerminatorTypically, a resistor placed at the end of a bus to prevent the reflection of signals.
TFTPTrivial File Transfer Protocol. A simplified version of FTP.
THTransmission header. SNA header that is appended to the SNA basic information unit (BIU). The TH uses one of a number of available SNA header formats.
THEnetTexas Higher Education Network. Regional network comprising over 60 academic and research institutions in Texas.
Thick EthernetAlso known as 10Base5.
ThinnetTerm used to define a thinner, less expensive version of the cable specified in the IEEE 802.3 10Base2 standard.
ThroughputRate of information arriving at, and possibly passing through, a particular point in a network system.
TIATelecommunications Industry Association. Organization that develops standards relating to telecommunications technologies. Together, the TIA and the EIA have formalized standards, such as EIA/TIA-232, for the electrical characteristics of data transmission.
TICToken Ring interface coupler. Controller through which an FEP connects to a Token Ring.
Tightly CoupledA term that describes the relationship between two computing processes whose successful completion and individual performance rates are highly inter-dependent.
Time-OutEvent that occurs when one network device expects to hear from another network device within a specified period of time, but does not. The resulting time-out usually results in a retransmission of information or the dissolving of the session between the two devices.
TN3270Terminal Emulation software that allows a terminal to appear to an IBM host as a 3278 Model 2 terminal.
TNotifyTime Notify. Specifies how often SMT initiates neighbor notification broadcasts.
TokenFrame that contains control information. Possession of the token allows a network device to transmit data onto the network.
Token busLAN architecture using token passing access over a bus topology. This LAN architecture is the basis for the IEEE 802.4 LAN specification.
Token PassingA MAC method where stations may only transmit when they are in possession of a special bit sequence (token) passed from station to station.
Token RingA ring topology network that uses token passing for MAC.
TonerAlso tone generator. In a tone test set, the tone generating device.
ToolAny device, software program or instrument constructed for the purpose of aiding a human in accomplishing a goal.
TOPTechnical Office Protocol.
Topology1. The arrangement of computing devices in a network. 2. A term describing such an arrangement.
TrailerThe group of bytes that marks the end of a frame and usually contains an error checking mechanism such as a CRC.
Transceiver1. In Ethernet, an electronic device that transforms signals between a node's internal circuitry and the Ethernet signals and also detects collisions. 2. Any device that can simultaneously transmit and receive.
Transfer RateThe rate at which data is transferred from one device to another, usually expressed in bit per second or in bytes per second.
TransientA short-lived electrical event.
Transmissionprecise clocking. Such signals have the same frequency, with individual characters encapsulated in control bits (called start bits and stop bits) that designate the beginning and end of each character. Compare with asynchronous plesiochronous transmission.
TransmissionThe activity of sending or conveying information.
TransmitTo send information.
TransportAny of the functions carried out by protocols in the Network or Transport Layers.
Transport ProtocolThe Protocol Layer of the OSI 7-Layer Model that is concerned with management of the data flow between source and destination.
TrapIn SNMP, a message sent from the Agent to the Console when the Agent detects that condition defined by the network manager has occurred.
TREDITraffic Reduced Encapsulation of DDP in IP. An AppleTalk tunneling protocol developed by Cayman.
Trojan HorseA maliciously-created computer program or virus that causes significant damage to a system. Trojan Horses are typically given attractive file names and placed on bulletin board systems. Damage usually occurs when the user launches the Trojan horse on his own system. Named after a successful offensive ploy made by the ancient Greek army at the siege of Troy.
TrueTypeAn outline font technology developed as an alternative to Adobe Postscript fonts.
TruncateA method of formatting data by removing characters at the end of the data that do not conform to the format desired.
TrunkA synonym for bus.