Professional Documents
Culture Documents
Data Com Enumerations Identifications and Acronyms Reviewer
Data Com Enumerations Identifications and Acronyms Reviewer
2. Data Communication
Refers to the exchange of data between a source and a receiver via form of transmission media.
3. Client-Server networks
Computer networks that use a dedicated computer/server to store data, manage resources and
control user access.
4. Intermediary Devices
A device that interconnects end devices.
5. End Devices
The source or destination of data transmitted over the network.
8. Converged Network
Capable of Delivering voice, video streams, text and Graphics over the same communication
channel.
11. An attack designed to slow or crash applications and processes on a network device.
22. Enable
A command that is use to enter privileged mode.
23. Keyword
A specific parameter defined in the operating system.
30. Scalability
Additional users and whole networks can be connected to the internet without degrading
performance for existing users
32. Security
Administrator can protect with the software and hardware security and by preventing physical
access to network devices
33. OS Shell
is either a command-line interface (CLI) or a graphical user interface (GUI) and enables a user to
interface with applications
34. Hardware
The physical part of a computer including underlying electronics.
36. Telnet
In band interfaces remotely establishing a CLI session through a virtual interface, over a
network. User authentication, passwords, and commands are sent over the network in plaintext
42. End
Can be used to exit out of global configuration mode regardless of which configuration mode
you are in
43. Argument
not predefined; a value or variable defined by the user
48. Up Arrow
Allows the user to scroll backward through commands
49. Tab
Completes the remainder of a partially entered command
50. Ctrl-A
Moves to the beginning of the line
51. Ctrl-E
Moves to the end of the line
52. Ctrl-R
Redisplays a line.
53. Ctrl-C
Exits the configuration mode or aborts the current command
54. Ctrl-Shift-6
Allows the user to interrupt an IOS process
====================================================================================
64. HTTP
an application protocol that governs the way a web server and a web client interact.
65. TCP
transport protocol that manages the individual conversations
66. IP
encapsulates the TCP segments into packets, assigns addresses, and delivers to the destination
host
67. Ethernet
allows communication over a data link and the physical transmission of data on the network
media
====================================================================================
72. Transition
Occurs at the middle of each bit period
73. Modulation
Is the process by which characteristics of one wave modifies another wave
74. Encoding
Converts a stream of data bits into a predefined code
76. Bandwidth
Capacity of a medium to carry data, Measures the amount of data that can flow from one place
to another in a given amount of time, The speed that bit travel, the number of bits that are
transmitted per second
77. Throughput
Measure of the transfer of bits across the media over a given period of time, Usually does not
match the specified bandwidth in physical layer implementations due to many factors
78. Goodput
Is throughput minus traffic overhead for establishing sessions, acknowledgments, and
encapsulation
equivalent of traffic rules that regulate the entrance of motor vehicles onto a roadway, the
absence of any media access control would be the equivalent of vehicles ignoring all other traffic
and entering the road without regard to the other vehicles
82. Router
Accepts a frame from a medium, de-encapsulates the frame, re-encapsulates the packet into a
new frame, forwards the new frame appropriate to the medium of the segment
87. Mesh
Provides high availability, but requires that every end system be interconnected to every other
system. Administrative and physical costs can be significant
89. Addressing
Frame field that Indicates the source and destination nodes.
90. Type
Frame field that Identifies the Layer 3 protocol in the data field.
91. Control
Frame field that Identifies special flow control services such as QoS
92. Data
Frame field that, contains the frame payload (i.e., packet header, segment header, and the
data).
94. Attenuation
The longer the signal travels, the more it deteriorates. All copper media must follow strict
distance limitations.
96. Crosstalk
disturbance caused by the electric or magnetic fields of a signal on one wire to the signal in an
adjacent wire. To cancel crosstalk opposing circuit wire pairs twisted together
97. UTP
is the most common networking media, terminated with rj-45 connectors, used for
interconnecting network hosts with networking devices such as switches, consists of four pairs
of color-coded wires that have been twisted together to help protect against signal interference
from other wires, color codes aid in cable termination.
98. STP
provides better noise protection than UTP, is significantly more expensive and difficult to install,
uses an rj-45 connector, combines the techniques of shielding to counter emi and rfi, and wire
twisting to counter crosstalk, uses four pairs of wires, each wrapped in a foil shield, which are
then wrapped in an overall metallic braid or foil.
99. Coaxial
a copper conductor used to transmit the electronic signals, a layer of flexible plastic insulation
surrounding a copper conductor, the insulating material is surrounded in a woven copper braid,
or metallic foil, that acts as the second wire in the circuit and as a shield for the inner conductor,
the entire cable is covered with a cable jacket to prevent minor physical damage, UTP cable has
essentially replaced coaxial cable in modern ethernet installations but is used in:, wireless
installations: coaxial cables attach antennas to wireless devices, cable internet installations
104. Jacket
Protects the fiber against abrasion, moisture, and other contaminants. Composition can vary
depending on the cable usage
106. Buffer
Used to help shield the core and cladding from damage
107. Cladding
Tends to act like a mirror by reflecting light back in the core of the fiber. Keeps light in the core
as it travels down the fiber.
108. Core
Light transmission element at the center of the optical fiber. Core is typically silica or glass. Light
pulses travel through the fiber core
113. Misalignment
The fiber-optic media are not precisely aligned to one another when joined
114. Endgap
The media does not completely touch at the splice or connection
115. Endfinish
The media ends are not well polished, or dirt is present at the termination
117. Interference
Disrupted by such common devices as fluorescent lights, microwave ovens, and other wireless
communications
118. Security
Devices and users, not authorized for access to the network, can gain access to the transmission.
121. Bluetooth
Wireless Personal Area Network (WPAN), uses a device pairing process for distances 1 to 100
meters
122. WiMAX
Worldwide Interoperability for Microwave Access, wireless broadband access.
6 TCP PROTOCOLS
1. DNS
2. DHCP
3. IMAP
4. TFTP
5. HTTP
6. UDP
STD Standard
Straight through
Straight through
8 wired
True
UTP Cable
True
Crimping
Registered