User Sopheak

Information

Mr.

Sopheak

Ros

gro.seuqiremunselleressap@sor.kaehpos

2017-09-04 02:51:15

Keywords

# Category Title Description Images Actions
466
settings_ethernet
Access Control List (ACL) A list of rules which you use to allow or deny network traffic. 0
314
settings_ethernet
Next Hop is a routing term that refers to the next closest router a packet can go through. The next hop is among the series of routers that are connected together in a network and is the next possible destination for a data packet. Example: picture bellow R2 is next hop of R1 and R3 is next hop of R2... 1
313
settings_ethernet
Static Route is a form of routing that occurs when a router uses a manually-configured routing entry, rather than information from a dynamic routing traffic. 0
312
settings_ethernet
Routing Table is a set of rules, often viewed in table format, that is used to determine where data packets traveling over an Internet Protocol (IP) network will be directed. 0
311
settings_ethernet
Loopback interface is a virtual interface that resides on a router. It is not connected to any other device. Loopback interfaces are very useful because they will never go down, unless the entire router goes down. 0
310
settings_ethernet
Scalability Network is the capability of a system, network, or process to handle a growing amount of work, or its potential to be enlarged in order to accommodate that growth. 0
309
settings_ethernet
Native VLAN is the only VLAN which is not tagged in a trunk, in other words, native VLAN frames are transmitted unchanged. Per default the native VLAN is VLAN 1 but you can change 0
308
settings_ethernet
MAC address flooding attack is a type of network attack where an attacker connected to a switch port floods the switch interface with very large number of Ethernet frames with different fake source MAC address. 0
307
settings_ethernet
Form factor is the specification of a motherboard – the dimensions, power supply type, location of mounting holes, number of ports on the back panel, etc. 1
306
settings_ethernet
Access Layer (hierarchical design model) is the layer that responsible for connect end device to the network. 1
305
settings_ethernet
Distribution Layer​ (hierarchical design model) is the layer that design for responsible to connect access layer to core layer. The purpose of this layer is to provide filters to limit what gets into the core. 1
304
settings_ethernet
Core layer (hierarchical design model) is the layer that design for responsible to provides an optimized and reliable transport structure by forwarding traffic at very high speeds as fast as possible. Devices at the core layer should not be burdened with any processes that stand in the way of switching packets at top speed. 1
303
settings_ethernet
Intrusion Prevention system (IPS) is a device or software application that monitors and tack action on the network traffic for malicious activity or policy violations. Any detected activity or violation is typically drop and reported either to an administrator. 0
302
settings_ethernet
Intrusion detection system (IDS) is a device or software application that monitors a network or systems for malicious activity or policy violations. Any detected activity or violation is typically reported either to an administrator. 1
301
settings_ethernet
Malwaer or malicious softare is software that is specifically designed to gain access or damage a computer without the knowledge of the owner. There are various types of malware including spyware, keyloggers, true viruses, worms, or any type of malicious code that infiltrates a computer. 0
300
settings_ethernet
Trojan horse, or Trojan is any malicious computer program which is used to hack into a computer by misleading users of its true intent.​Example: You download program from untrust website and the virus or malicious is hide in program. So when you install the program the malicious will extract and effect to your computer. 1
299
settings_ethernet
Computer virus is a program or codes which create in order to destroy, steal your data or make your computer has problem. Example: your computer is auto restart without any reason. 0
298
settings_ethernet
Subnet mask "is a 32-bit number which is used to divide the IP address into network address and host address.Example: 255.255.255.0 " 0
297
settings_ethernet
Power over Ethernet (PoE) is a technology for wired Ethernet LANs (local area networks) that allows the electrical current necessary for the operation of each device to be carried by the data cables rather than by power cords. 1
296
settings_ethernet
Collision domain is a section of a network connected by a shared medium where data packets can collide with one another when being sent, particularly when using early versions of Ethernet. 1
295
settings_ethernet
Ring Topology is a network topology in which each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node - a ring. 1
294
settings_ethernet
Haft Duplex Refers to the transmission of data in one directions at the a time. For example: a walkie-talkie is a half-duplex device because only one party can transmit at a time. 1
293
settings_ethernet
Full Duplex Refers to the transmission of data in two directions simultaneously. For example, a telephone is a full-duplex device because both parties can talk at once. In contrast, a walkie-talkie is a half-duplex device because only one party can transmit at a time. 1
292
settings_ethernet
Star Topology is a topology for a Local Area Network (LAN) in which all nodes are individually connected to a central connection point, like a hub or a switch. 1
291
settings_ethernet
Worldwide Interoperability for Microwave Access (WiMAX) is a family of wireless communications standards initially designed to provide 30 to 40 megabit-per-second data rates, in 2011 can providing up to 1 Gbit/s. 1
290
settings_ethernet
Ethernet straight-through cable is kind of Ethernet cable that use to connect the different type of device. Example: computer to Switch, Switch to Router… 1
289
settings_ethernet
Wi-Fi Wi-Fi or WiFi is a technology that allows electronic devices to connect to a wireless LAN (WLAN) network, mainly using the 2.4 gigahertz (12 cm) UHF and 5 gigahertz (6 cm) SHF ISM radio bands. Note: Wi-Fi standard is IEEE 802.11 and wifi build with device like router, phone, computer... 1
288
settings_ethernet
Cable Jacket is protective outer covering for a cable. Depending on the intended use for the cable and the operational environment, it may protect against moisture, abrasion, magnetic fields, radiation, and so on. 1
287
settings_ethernet
Throughput is the way to test exacly speed or bandwidth of your computer of the hold bandwith of internet or in the network. Example: you can use many tool to throughput your banwidth, like: http://www.speedtest.net/ 0
286
settings_ethernet
Short for Light Emitting Diode(LED) monitor is the technology used for display in flat screen, flat panel computer monitor or television. It has a very short depth and is light in terms of weight. 1
285
settings_ethernet
liquid crystal display(LCD) Monitor is the technology used for displays in notebook and other smaller computers. 1
284
settings_ethernet
Network interface card (NIC) is a circuit board or card that is installed in a computer so that it can be connected to a network.Note: if your computer doesn't have NIC or WNIC (wireless Network Interface Card) , you can't access to network. 1
283
settings_ethernet
Wi-Fi range extender Wi-Fi range extender, sometimes called a range expander, is a type of wireless repeater used to expand the reach of a wireless LAN. The device is situated in between a base router or access point and a client that is not close enough to receive acceptable service or one that is on the other side of a barrier. 1
282
settings_ethernet
de-encapsulation is the process of extract from bottom to top layer in OSI model by remove information component ( header, trailer..) from layer to other layer to get the real data. Example: de-encapsulation from bits to Frame, from frame to packet …. 1
281
settings_ethernet
Interface (on router) is the way we call physical port on router when view in logical way. 1
280
settings_ethernet
Reverse Address Resolution Protocol (RARP) is an obsolete computer networking protocol used by a client computer to request its Internet Protocol (IPv4) address from a computer network, when it's has Mac address. Note: ARP map or resolve from IPV4 to Mac address but RARP is map or resolve from Mac address to IPV4. 0
279
settings_ethernet
Internet layer ( TCP/IP) "is a layer in TCP/IP model that responsible how systems on different network segments find each other and define the best path to destination. " 0
278
settings_ethernet
Physical layer (OSI) "is a layer in OSI model that responsible to convert packet or data in to bits that can transmition over media. Note: bits has two value 0 and 1. " 0
277
settings_ethernet
Network layer (OSI) "is a layer in OSI model that responsible how systems on different network segments find each other. Note: In Network layer, it will add IP address to packet in order to send data to receiver in network. " 0
276
settings_ethernet
Data link layer (OSI) "is a layer in OSI model that responsible for Frame that handle flow control and add Mac address in to frame. Note: It add source and destination Mac address to frame in order to finde way to destination and back to sender. " 0
275
settings_ethernet
Transport layer (OSI) "is a layer in OSI model that responsible for break data into segments and assigns sequence number. Example: Your data has big size but when send to communicate with other computer, it will break down to small pieces and order by put sequence number. " 0
274
settings_ethernet
Session layer (OSI) "is a layer in OSI model that responsible for establishing and maintaining connections. responsible for ports and ensures queries for services that application layer use. Example: If you want to access website, you will use browser. So it will add service: http or https and port: 80 or 443. " 0
273
settings_ethernet
Presentation Layer (OSI) "is a layer in OSI model that responsible for ensure data is received in a useable format when recieve and data encryption is done when transmition. Ex. When you receive chat from your friends and can read, it mean useable format. " 1
272
settings_ethernet
Application layer (OSI) "is a layer in OSI model that responsible for determining when the device need to access to the network is required. Example: you use skype chat to your friend, so it will determin how skype app access to network. " 1
271
settings_ethernet
Transmission Control Protocol/Internet Protocol (TCP/IP) Model "is a model which describes the functions that occur at each layer of protocols which protocols work in which layer. " 1
270
settings_ethernet
Open Systems Interconnection (OSI) model "is a model standard which is used for data network transmition, design, operation specification and troubleshooting in the network. " 1
269
settings_ethernet
Telnet is a network protocol that provides administrators with a unsecure way to access a remote computer, Router, Swich…Telnet keep data in plain text during remote that allow hacker can capture user name and password. 0
268
settings_ethernet
Secure Socket Shell (SSH) SSH, also known as Secure Socket Shell, is a network protocol that provides administrators with a secure way to access a remote computer, Router, Switch...SSH will encryption data during remote that protect from hacker capture user name and password. 0
267
settings_ethernet
Auxilary cable ​(AUX) is the cable use to connect access directly to switch or router with AUX port. AUX cable have two part of connector, one is SERIAL port that needs to connect to modem and other is Rolled cable connect to AUX port. We can connect access far from the work place because modem can connect with phone line. 1
266
settings_ethernet
Console Cable is the cable use to connect access directly to switch or router with console port. Console cable have two part of connector, one is SERIAL port that needs to go to the serial/COM port on your PC or laptop other one is a ROLLED cable. 2
265
settings_ethernet
shielded twisted-pair cable (STP) is the kind of special copper Twist pair that has covering or shield to attempt to prevent electromagnetic interference​ that effect to data during transfering. 1
264
settings_ethernet
Intranet is a private network accessible only to an organization's staff. 1
263
settings_ethernet
Intermediary Device is the device that make the path connects data from source to destination. Example: Switch, Router, Hub, bridge.. 1
262
settings_ethernet
End Device is the device that use the last connection (endpoint) in a networked system. For example, a user's PC is an end device,Voip phone and so is a server. End device connect to with end device or to the network by Switch, Router or other equipment. 1
261
settings_ethernet
Fiber Optic Fiber optic (or "optical fiber") is the kind of media that use technology associated with the transmission of information as light impulses along a glass or plastic wire or fiber. 1
260
settings_ethernet
Scanner is a hardware input device for a computer. Scanners allow a user to take a printed picture, drawing, or document and convert it into a digital file (either an image or a text file) so that it can stored, viewed, and edited on a computer. 1
259
settings_ethernet
Local Printer is an external hardware output device responsible for taking electronic data stored on a computer generating a hard copy of that data and need to connect directly to computer. Note: Local printer don't have (Network Interface Card). 1
258
settings_ethernet
Extranet is a private network that uses Internet technology and the public telecommunication system to securely share part of a business's information or operations with suppliers, vendors, partners, customers, or other businesses. 1
257
settings_ethernet
IOE ( Internet of Everything) "Internet of Everything (IoE) is the networked connection of people, process, data, and things to be connectedness creates as “everything” comes online." 1
221
settings_ethernet
Mouse is the device use to input signal in to computer in order to control the action movement object on the graphic interface. 1
220
settings_ethernet
Frame is the data in Data link layer of OSI Model that contains a header field and a trailer field. In Frame header field, has source and Destination MAC address. 1