Glossary

Glossary of Terms

- 802.11A : defines the use of the two lower levels of the OSI architecture, specifying its rules of operation in a WLAN.

- 802.11B : 802.11b, is an amendment to the IEEE 802.11 standard that extends the transfer rate up to 11 Mbit / s using the same 2.4 GHz band. 

- 802.11G : 802.11g is an amendment to the IEEE 802.11 specification that extended performance of up to 54 Mbit / s with the same 2.4 GHz band as 802.11b.

- ACCESS POINT : (Wireless Access Point) It is a device that connects wired communication devices to form a wireless network.

- ADAPTER : Is used to transform an interface on another, so that a class that could be used first, make use of it through the second.

- ADRESS : An address, also E-mail address or Internet address, or network address, or Web address, is a series of letters, numbers and / or symbols that identify to yourself and the Internet which identifies you to you (actually your computer).

- AD-HOC : Ad hoc is a Latin phrase that literally means "for this."

- ADMINISTRATOR : Professional running, maintains, operates and ensures the functioning of a computer system.

- AES : (Advanced Encryption Standard) Scheme is a block cipher adopted as an encryption standard by the EE.UU government.

- BANDWIDTH : For analog signals, the bandwidth is the length, measured in Hz, the frequency range in which the highest concentration of the signal power. It can be calculated from a time signal by Fourier analysis. They are also called the effective frequencies belonging to this range.

- BIT : (Binary digit) A bit is a digit in the binary number system. The storage units are per symbol bit.

- BROADBAND : The term broadband refers to the wide bandwidth characteristics of a transmission medium and its ability to carry multiple signals and traffic types simultaneously. 

- BRIDGES : Device interconnection of computer networks. 

- BROWSER : Is software that allows access to Internet, playing file information and websites so that they can be read.

- BYTE : Is a unit of information used as a multiple of the bit. Usually equal to 8 bits.

- CABLE MODEM : Is a special type of modem designed for modulating the data signal onto a cable television infrastructure.

- CROSSOVER CABLE : Is a physical interface commonly used to connect networks structured cabling (categories 4, 5, 5e, 6 and 6a).

- CLIENT : Equipment or process that consumes resources and services provided by another call server, usually remotely.

- CISCO : Cisco Certification is a training in computer networking technology company Cisco ofrece.1 that is divided into three levels of increasing complexity: Cisco Certified Network Associate, Cisco Certified Network Professional and Cisco Certified Internetwork Expert, best known for its acronym: CCNA, CCNP and CCIE.

- CONMUTATOR : Device logic analog computer networking.

- CORE NETWORK : Local network design to three layers (core, distribution and access).

- CSMA/CA = (Carrier Sense Multiple Access with Collision Avoidance) is a protocol for controlling access to low-level network that allows multiple stations use the same transmission medium.

- CTS =  (Component Transaction Server) Was software that provides services to Component Object Model (COM) software components, to make it easier to create large distributed applications.

- DATABASE : A database is a collection of data belonging to the same context and systematically stored for later use.

- DEFAULT GATEWAY  : Is a device or computer that serves as a link between two networks, ie it is the device that connects and manages the data traffic between two or more networks.

- DHCP : (Dynamic Host Configuration Protocol) Is a network protocol that allows clients to obtain their IP network settings automatically.

- DINAMIC IP ADDRESS : Is a numerical label assigned to each device (eg, computer, printer) participating in a computer network utilizing the Internet Protocol for communication.

- DMZ : (Demilitarized Zone) Is a local network that sits between an organization's internal network and an external network, usually the Internet.

- DNS :  (Domain Name System) Is a hierarchical naming system for computers, services or any resource connected to the Internet or a private network.

- DRIVER : Is a computer program that allows the operating system to interact with a peripheral, making an abstraction of the hardware and interface-possibly providing data to the device.

- DOWNLOAD : In technology, the terms download, download, grab, download, extract, remove, take are used to refer to the collection of data from a device through a communication channel.

- DSL : (Digital Subscriber Line) Is a term used to refer globally to all technologies that provide a digital connection on line subscriber base or switched telephone network: ADSL, ADSL2, ADSL2 +, SDSL, IDSL, HDSL, SHDSL, VDSL and VDSL2.

- DSSS : (Decision Support System) Is very broad, because there are many approaches to decision making and due to the wide range of fields in which they are taken.

- DTIM : (Delivery Traffic Indication Message) Is an indication of message traffic that informs customers about the presence of buffer and / or multichannel data access point.

- ERROR : Is a network service that allows users to send and receive messages and files quickly (also called e-mails/letters e) by electronic communication systems.

- EAP : (Extensible Authentication Protocol) authentication framework is commonly used in WLAN networks Point-to-Point Protocol. While the EAP protocol is not limited to wireless LAN and can be used for authentication in wired networks, it is most often the first use.

- EAP-PEAP : (Extensible Authentication Protocol - Protected Extensible Authentication Protocol)  Is a protocol that encapsulates the Extensible Authentication Protocol (EAP) within an encrypted and authenticated Transport Layer Security (TLS) tunnel.

- EAP-TLS : ( Extensible Authentication Protocol - Secure Sockets Layer) Are cryptographic protocols that provide secure communications over a network, typically the Internet.

- ENCRYPTION : Encryption is a method to increase the security of a message or file by encoding the content so that it can only read the person who has the appropriate encryption key to decode it.

- ETHERNET : Is a standard local area network computers with media access contention (CSMA / CD).

- FDDI : (Fiber Distributed Data Interface) is a set of ISO and ANSI standards for data transmission in computer networks or wide area network (LAN) via fiber optic cable.

- FINGER : In computing, a protocol that provides users of a machine.

-  FIREWALL : Is a part of a system or network that is designed to block unauthorized access while permitting authorized communications.

- FIREWALL SPI  : (Stateful Packet Inspection) is a firewall that keeps track of the state of network connections (such as TCP streams, UDP communication) traveling across it. 

- FIRMWARE : Is a block of machine instructions for specific purposes, recorded in a memory, usually read / write (ROM, EEPROM, flash, etc..), which provides the lowest-level logic that controls the electronics of a device of any kind.

- FRAGMENTATION : A phenomenon computer storage.

- FTP : (File Transfer Protocol) Computer, is a network protocol for transferring files between computers connected to a TCP (Transmission Control Protocol), based on client-server architecture.

- FULL DUPLEX : Is a term used to define a system that is able to maintain two-way communication, sending and receiving messages simultaneously.

- GATEWAY : Is a device used to link networks with different architectures and protocols at all levels of communication.

- HACKER : In computing, a hacker or hacker is a person who belongs to one of these communities or subcultures different.

- HALF DUPLEX : means that the method or protocol for sending information is bidirectional but not simultaneously. 

- HARDWARE : refers to all tangible parts of a computer system, its components are electrical, electronic, electromechanical and mechanical.

- HOME :  is how to reference a computer file or directory in a file system of a particular operating system.

- HTTP : (Hypertext Transfer Protocol) Is the protocol used in each transaction of the World Wide Web.

- HUB : A hub or hub is a device that allows you to centralize the network cabling and to enlarge.

- INTRANET : An intranet is a private computer network that uses Internet technology to share within an organization of their information systems and operational systems.

- IEEE : (Institute of Electrical and Electronics Engineers) technical and professional association dedicated to the standardization world, among other things.

- INFRASTRUCTURE : The design of IT infrastructure solutions requires the joint efforts of a multidisciplinary team specialized in different technologies involved.

- INFRASTRUCTURE MODE : Is the type most widely used wireless network currently. It is a client-server network, where customers are usually personal computers that connect to the server, called an access point in this case.

- INTERNET : Internet is a decentralized collection of interconnected communication networks using family TCP / IP, which ensures that the physical networks that comprise heterogeneous function as a single logical network, worldwide.

- IP : (Internet Protocol) The number that identifies each device within an IP network.

- IP ADDRESS : Is a numerical label that identifies, in a logical and hierarchical, to an interface (element communication / connection) of a device (usually a computer) within a network use the protocol, which corresponds to the network layer of the OSI model.

- IPCONFIG : Is a console application that displays the network settings of current TCP / IP configuration and updates the DHCP protocol and domain name system (DNS).

- IPSEC : (Internet Protocol security) Is a set of protocols whose function is to secure communications over the Internet Protocol (IP) by authenticating and / or encrypting each IP packet in a data stream.

- ISM BAND : (Industrial, Scientific and Medical) are bands reserved internationally for non-commercial use of RF electromagnetic industrial, scientific and medical. Currently these bands have been popularized by its use in WLAN communications (eg Wi-Fi) or WPAN (eg Bluetooth).

- ISP : (Internet Service Provider) Is a company that provides Internet access to its customers. An ISP connects its users to the Internet through different technologies such as DSL, Cable modem, GSM, Dial-up.

- LINK : A hyperlink, reference to a hypertext document to another document or resource.

- LATENCY : Data on computer networks called latency to the sum of time delays within a network.

- LAYER : In computing, a compatibility layer is a term that refers to certain components created to allow an operating system to use binary executables (programs) or libraries that were created for other operating system incompatible with the first.

- LAN : (Local Area Network) is the interconnection of one or more devices.

- LOAD  : In technology, the terms download, download, grab, download, extract, remove, take are used to refer to the collection of data from a device through a communication channel.

- MAC : (Media Access Control) Is a 48-bit identifier (6 blocks hexadecimal) that uniquely corresponds to a card or network device.

- MAN  : (Metropolitan Area Network) is a network of high-speed (broadband) that covers a large geographic area, providing integration capacity by transmitting multiple services data, voice and video, over transmission media such as fiber optic and twisted pair (MAN LOOP ), the copper pair technology is positioned as the world's largest network an excellent choice for creating metropolitan networks because of its low latency (between 1 and 50 ms), high stability and lack of radio interference networks MAN lOOP, offering speeds of 10Mbps or 20Mbps over copper pairs and 100Mbps, 1Gbps and 10Gbps Fiber optic.

- MBPS : (Megabit per second) Is a unit used to measure data throughput equivalent to 1000 kb / s 1 million b / s.

- . MIRC : (Internet Relay Chat) communication protocol software / internet.

- MASK : Is the set of data which, along with an operation permit selectively removing certain data stored in another set.

- NETWORK : A network or network consists of a set of computers connected together through various methods to share information and services.

- NET : Is a framework from Microsoft that makes an emphasis on transparency of networks, regardless of hardware platform and enables rapid application development.

- NIC : (Network Information Center) institution subcontracted to Network Solutions Inc. What I've been online for the first time in private hands.

- NFS : (Network File System) es un protocolo de nivel de aplicación, según el Modelo OSI. Es utilizado para sistemas de archivos distribuido en un entorno de red de computadoras de área local.

- NETWORK CLIENT / SERVER : The client-server model is a distributed application structure that divides computing tasks or workloads between the providers of a resource or service, called servers, and service requesters, called clients.

- NAT : (Network Address Translation) Is a mechanism used by IP routers to exchange packets between two networks that assign mutually incompatible directions. It consists of converting, in real time, the addresses used on packages transported.

- NETWORK ADDRESS : A network address is an identifier for a node or network interface of a telecommunications network.

- NNTP : (Network News Transport Protocol) is a protocol originally created for reading and posting Usenet news articles. Its literal translation into Spanish is "Transfer Protocol Network News".

- NODE : In communication networks, a node is either a connection point, a point of redistribution or communication endpoint (some terminal equipment).

- OFDM : (Orthogonal Frequency Division Multiplexing) a multiplexing which is to send a set of carrier waves of different frequencies, each of which carries information which is modulated QAM or PSK.

- OSI : (Open System Interconnection) The model of Open Systems Interconnection (ISO / IEC 7498-1), also called OSI (in English, Open System Interconnection) network model is descriptive, which was created by the International Organization for Standardization (ISO) in the year 1980.1 It is a framework for defining architectures interconnection communications systems.

- PACKET : Is called network packet or data packet to each of the blocks into which, in the network level, the information to be sent. Below the level of network discussing network frame, although the concept is similar.

- PROTOCOL : In computing and telecommunications, is the set of rules and standards that control the sequence of messages that occur during communication between entities within a network, such as telephones or computers.

- PATCH CABLE : A cable or cable or patch cord is an electrical or optical cable used to connect one electronic or optical device to another for signal routing.

- PEER TO PEER : Is a type of decentralization and distributed network architecture in which each node in the network (called "peers") act as providers and consumers of resources, in contrast to the centralized client-server model where the client nodes requesting access to resources provided by central servers.

- PASSWORD : A password is a secret word or string of characters used for user authentication to prove identity or access approval to gain access to a resource (example: an access code is a type of password), which should be kept secret from those not allowed access.

- PEAP : (Protected Extensible Authentication Protocol) The Protected Extensible Authentication Protocol, also known as Protected EAP or simply PEAP, is a protocol that encapsulates the Extensible Authentication Protocol (EAP) within an encrypted and authenticated Transport Layer Security (TLS) tunnel. 

- PERFORMANCE  : A performance, in performing arts, generally comprises an event in which a performer or group of performers behave in a particular way, in another group of people, the audience. Choral music and ballet are examples.

- PING : (Packet Internet Groper) seeks and package tracking computer networks.

- POE : (Power over Ethernet) Power over Ethernet (Power over Ethernet, PoE) is a technology that incorporates power to a standard LAN infrastructure.

- POP3 : (Post Office Protocol) It is a network protocol used in local email client for email messages stored on a remote server. It is an application layer protocol in the OSI model.

- PORT CONNECTION : In computer networking, a port is an application-specific or process-specific software construct serving as a communications endpoint in a computer's host operating system.

- PPPOE : (Point-to-Point Protocol Over Ethernet) The Point-to-Point Protocol over Ethernet (PPPoE) is a network protocol for encapsulating PPP frames inside Ethernet frames.

- PPTP : (Point-to-Point Tunneling Protocol) The Point-to-Point Tunneling Protocol (PPTP) is a method for implementing virtual private networks. PPTP uses a control channel over TCP and a GRE tunnel operating to encapsulate PPP packets.

- PROXY : Proxy is an agent or substitute authorized to act for another person or a document which authorizes the agent so to act.

- REMOTE ACCESS : Connection to a data-processing system from a remote location, for example through a virtual private network.

- RADIUS : (Remote Authentication Dial In User Service) is a networking protocol that provides centralized Authentication, Authorization, and Accounting (AAA) management for users that connect and use a network service.

- RED  : is a set of computer hardware and software connected together through physical devices that send and receive electrical signals, electromagnetic waves or other means to transport data, in order to share information, resources and provide services. 

- RJ-45 : (registered jack 45) Is a physical interface commonly used to connect networks structured cabling (categories 4, 5, 5e, 6 and 6a).

- ROAMING : Is a concept used in wireless communications is related to the ability of a device to move from one coverage area to another.

- ROUTER : Is a device that provides connectivity to the network level or third level in the OSI model.

 - RTP  : (Real-time Transport Protocol) It is a session-level protocol used for transmission of real-time information, such as audio and video in a video-conference.

- RTS : (Real-time strategy) is a sub-genre of strategy video game which does not progress incrementally in turns.

- SEQUENCE SPREAD : is one of the channel coding methods (prior to modulation) in spread spectrum digital signal for transmission over radio waves most used. Both DSSS and FHSS are defined in the IEEE 802.11 standard for wireless local area networks WLAN.

- SERVER : That responds to requests across a computer network to provide, or help to provide, a network service.

- SMTP : ( Simple Mail Transfer Protocol) Is an Internet standard for electronic mail (e-mail) transmission across Internet Protocol (IP) networks.

-  SNMP :  (Simple Network Management Protocol) is a layer protocol application that facilitates the exchange of management information between network devices.

- SESION : In computing, especially computer networks, a session is the duration of a connection using a session layer of a network protocol, or the duration of a connection between a user (the agent) and a server, usually involving the exchange of multiple data packets between the user's computer and the server.

- SOFTWARE : Software is known as the logical equipment or software of a computer system, comprising all the necessary software components that enable specific tasks, as opposed to the physical components are called hardware.

- SOHO : (Small Office-Home Office) refers to the category of business or cottage industry that involves from 1 to 10 workers.

- SSID : (Service Set IDentifier) is a name included in all packets on a wireless network (Wi-Fi) to identify them as part of that network.

- STATIC ROUTING : Static routing is a concept describing one way of configuring path selection of routers in computer networks. It is the type of routing characterized by the absence of communication between routers regarding the current topology of the network.

- SUBNET MASK : A subnetwork, or subnet, is a logically visible subdivision of an IP network. The practice of dividing a network into two or more networks is called subnetting.

- SWITCHES : A digital device logical switches interconnecting computer networks that operates in the data link layer of the OSI model. Its function is to interconnect two or more network segments, similar to the network bridges, passing data from one segment to another in accordance with the destination MAC address of frames on the network.

- TCP : (Transmission Control Protocol) is one of fundamental Internet protocols. It was created between 1973 and 1974 by Vint Cerf and Robert Kahn.

- TRANSACTION : A transaction is an interaction with a complex data structure, consisting of several processes which are to be applied one after the other. The transaction must be performed only once and without manipulating medium structure can be reached by the rest of the system until the completion of all processes. 

- TRANSMISSION : is the physical transfer of data (a digital stream of bits) for a communication channel point to point or point to multipoint. Examples of these channels are twisted pair cables, optical fibers, wireless communication channels, and storage media.

- TRAFFIC : Traffic is the amount of data sent and received by visitors to a website. This is a large proportion of Internet traffic. Web traffic is determined by the number of visitors and pages they visit.

- TCP/IP : (Transmission Control Protocol-Internet Protocol) The set of protocols called TCP / IP, referring to the two most important protocols that compose it: the Transmission Control Protocol (TCP) and Internet Protocol (IP), which were among the first to be defined, and are the most common of the family.

- TELNET :  (TELecommunication NETwork) Is the name of a network protocol to another machine to manage it remotely as if you were sitting in front of her. It is also the name of the computer program that implements the customer.

- TFTP : (Trivial file transfer Protocol) It is a very simple transfer protocol similar to FTP a basic version. TFTP is often used to transfer small files between computers on a network, such as when an X Window terminal or any other thin client boots from a network server.

- TKIP : (Temporal Key Integrity Protocol) is also called WPA WEP key hashing, including emerging 802.11i standard mechanisms for improving wireless data encryption. WPA is TKIP, which uses the same algorithm as WEP, but built in a different key.

- TLS : (Transport Layer Security ) Are cryptographic protocols that provide secure communications over a network, typically the Internet.

- TOKEN RING : It is a network architecture developed by IBM in the 1970s with physical topology and technical ring token passing access, using a 3-byte frame called a token that travels around the ring. Token Ring is collected in IEEE 802.5. Disused for popularizing Ethernet is not currently used in network designs.

- TOPOLOGY : It is defined as a family of communication used by computers to form a network to exchange data. In other words, the way it is designed the network, either in the physical or logical.

- UDP : (User Datagram Protocol) It is a transport layer protocol based on the exchange of datagrams (Encapsulated OSI Layer 4). Allows sending datagrams through the network without previously established connection, since the datagram itself incorporates sufficient routing information in its header.

- UPDATE : In computing, a patch consists of changes that apply to a program, to fix bugs, add functionality, update, etc...

- URL : (Uniform Resource Locator) Is a sequence of characters, according to a standard format and a model, which is used to name Internet resources for its location or identification, such as text documents, images, videos, digital presentations, etc...

- VPN : (Virtual Private Network) It is a networking technology that allows secure extension of the local network (LAN) over a public network such as the Internet or uncontrolled. Allows the computer on the network to send and receive data on shared or public networks like a private network with all the functionality, security and management policies in a private network.

- WORK STATION : Is a high-performance minicomputer designed for technical or scientific work. On a network computer, is a computer that provides users access to servers and network peripherals.

- WAN : (Wide Area Network) Is a computer network that spans multiple physical locations, providing service to a region, a country, including several continents. Is any network that connects multiple local area networks, LAN calls, so that its members are not all in the same physical location.

- WEP : (Wired Equivalent Privacy) Encryption system is included in the IEEE 802.11 protocol for wireless networks as it can encrypt the information transmitted. Provides encryption level 2, based on the RC4 encryption algorithm using 64-bit keys (40 bits 24 bits of initialization vector IV) or 128 bits (104 bits 24 bits of IV).

- WIFI : (Wireless Fidelity) Is a mechanism for connecting electronic devices wirelessly. Devices enabled with Wi-Fi, such as a personal computer, a video game console, smartphone or digital audio player can connect to the Internet through an access point wireless network.

- WINIPCFG : Is the extended version and a Microsoft Windows window IPCONFIG.EXE. Winipcfg Writing in the command line Run box (which appears when you select this option in the Start menu).

- WLAN : (Wireless Local Area Network) Is a flexible wireless communication system, widely used as an alternative to wired LANs, or as an extension thereof. They use radio frequency technology that allows greater mobility to the users by minimizing wired connections.

- WPA: (Wi-Fi Protected Access) It is a system to protect wireless networks (Wi-Fi), created to address the shortcomings of the previous system, Wired Equivalent Privacy (WEP) .1 Researchers have found several weaknesses in the WEP algorithm (such as the initialization vector reuse (IV), which are derived statistical attacks that can recover the WEP key, etc.).

- WPA2 : (Wi-Fi Protected Access 2) Is a system to protect wireless networks (Wi-Fi), created to address the vulnerabilities identified in WPA. WPA2 is based on the new 802.11i standard. WPA, as a previous version, you might consider "migration" does not include all the features of IEEE 802.11i, while it can be inferred that WPA2 is the certified version of the 802.11i standard.

- WWW : (World Wide Web) Is a distribution system of hypertext or hypermedia documents interconnected and accessible via the Internet. With a web browser, a user views Web sites made ​​up of web pages that may contain text, images, video or other multimedia content, and browse through these pages using hyperlinks.

No hay comentarios:

Publicar un comentario