466 |
settings_ethernet
|
Access Control List (ACL) |
A list of rules which you use to allow or deny network traffic. |
0
|
|
314 |
settings_ethernet
|
Next Hop |
is a routing term that refers to the next closest router a packet can go through. The next hop is among the series of routers that are connected together in a network and is the next possible destination for a data packet. Example: picture bellow R2 is next hop of R1 and R3 is next hop of R2...
|
1
|
|
313 |
settings_ethernet
|
Static Route |
is a form of routing that occurs when a router uses a manually-configured routing entry, rather than information from a dynamic routing traffic.
|
0
|
|
312 |
settings_ethernet
|
Routing Table |
is a set of rules, often viewed in table format, that is used to determine where data packets traveling over an Internet Protocol (IP) network will be directed.
|
0
|
|
311 |
settings_ethernet
|
Loopback interface |
is a virtual interface that resides on a router. It is not connected to any other device. Loopback interfaces are very useful because they will never go down, unless the entire router goes down.
|
0
|
|
310 |
settings_ethernet
|
Scalability Network |
is the capability of a system, network, or process to handle a growing amount of work, or its potential to be enlarged in order to accommodate that growth.
|
0
|
|
309 |
settings_ethernet
|
Native VLAN |
is the only VLAN which is not tagged in a trunk, in other words, native VLAN frames are transmitted unchanged. Per default the native VLAN is VLAN 1 but you can change
|
0
|
|
308 |
settings_ethernet
|
MAC address flooding attack |
is a type of network attack where an attacker connected to a switch port floods the switch interface with very large number of Ethernet frames with different fake source MAC address.
|
0
|
|
307 |
settings_ethernet
|
Form factor |
is the specification of a motherboard – the dimensions, power supply type, location of mounting holes, number of ports on the back panel, etc.
|
1
|
|
306 |
settings_ethernet
|
Access Layer (hierarchical design model) |
is the layer that responsible for connect end device to the network.
|
1
|
|
305 |
settings_ethernet
|
Distribution Layer (hierarchical design model) |
is the layer that design for responsible to connect access layer to core layer. The purpose of this layer is to provide filters to limit what gets into the core.
|
1
|
|
304 |
settings_ethernet
|
Core layer (hierarchical design model) |
is the layer that design for responsible to provides an optimized and reliable transport structure by forwarding traffic at very high speeds as fast as possible. Devices at the core layer should not be burdened with any processes that stand in the way of switching packets at top speed.
|
1
|
|
303 |
settings_ethernet
|
Intrusion Prevention system (IPS) |
is a device or software application that monitors and tack action on the network traffic for malicious activity or policy violations. Any detected activity or violation is typically drop and reported either to an administrator.
|
0
|
|
302 |
settings_ethernet
|
Intrusion detection system (IDS) |
is a device or software application that monitors a network or systems for malicious activity or policy violations. Any detected activity or violation is typically reported either to an administrator.
|
1
|
|
301 |
settings_ethernet
|
Malwaer or malicious softare |
is software that is specifically designed to gain access or damage a computer without the knowledge of the owner. There are various types of malware including spyware, keyloggers, true viruses, worms, or any type of malicious code that infiltrates a computer.
|
0
|
|
300 |
settings_ethernet
|
Trojan horse, or Trojan |
is any malicious computer program which is used to hack into a computer by misleading users of its true intent.Example: You download program from untrust website and the virus or malicious is hide in program. So when you install the program the malicious will extract and effect to your computer.
|
1
|
|
299 |
settings_ethernet
|
Computer virus |
is a program or codes which create in order to destroy, steal your data or make your computer has problem. Example: your computer is auto restart without any reason.
|
0
|
|
298 |
settings_ethernet
|
Subnet mask |
"is a 32-bit number which is used to divide the IP address into network address and host address.Example: 255.255.255.0
"
|
0
|
|
297 |
settings_ethernet
|
Power over Ethernet (PoE) |
is a technology for wired Ethernet LANs (local area networks) that allows the electrical current necessary for the operation of each device to be carried by the data cables rather than by power cords.
|
1
|
|
296 |
settings_ethernet
|
Collision domain |
is a section of a network connected by a shared medium where data packets can collide with one another when being sent, particularly when using early versions of Ethernet.
|
1
|
|
295 |
settings_ethernet
|
Ring Topology |
is a network topology in which each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node - a ring.
|
1
|
|
294 |
settings_ethernet
|
Haft Duplex |
Refers to the transmission of data in one directions at the a time. For example: a walkie-talkie is a half-duplex device because only one party can transmit at a time.
|
1
|
|
293 |
settings_ethernet
|
Full Duplex |
Refers to the transmission of data in two directions simultaneously. For example, a telephone is a full-duplex device because both parties can talk at once. In contrast, a walkie-talkie is a half-duplex device because only one party can transmit at a time.
|
1
|
|
292 |
settings_ethernet
|
Star Topology |
is a topology for a Local Area Network (LAN) in which all nodes are individually connected to a central connection point, like a hub or a switch.
|
1
|
|
291 |
settings_ethernet
|
Worldwide Interoperability for Microwave Access (WiMAX) |
is a family of wireless communications standards initially designed to provide 30 to 40 megabit-per-second data rates, in 2011 can providing up to 1 Gbit/s.
|
1
|
|
290 |
settings_ethernet
|
Ethernet straight-through cable |
is kind of Ethernet cable that use to connect the different type of device. Example: computer to Switch, Switch to Router…
|
1
|
|
289 |
settings_ethernet
|
Wi-Fi |
Wi-Fi or WiFi is a technology that allows electronic devices to connect to a wireless LAN (WLAN) network, mainly using the 2.4 gigahertz (12 cm) UHF and 5 gigahertz (6 cm) SHF ISM radio bands. Note: Wi-Fi standard is IEEE 802.11 and wifi build with device like router, phone, computer...
|
1
|
|
288 |
settings_ethernet
|
Cable Jacket |
is protective outer covering for a cable. Depending on the intended use for the cable and the operational environment, it may protect against moisture, abrasion, magnetic fields, radiation, and so on.
|
1
|
|
287 |
settings_ethernet
|
Throughput |
is the way to test exacly speed or bandwidth of your computer of the hold bandwith of internet or in the network. Example: you can use many tool to throughput your banwidth, like: http://www.speedtest.net/
|
0
|
|
286 |
settings_ethernet
|
Short for Light Emitting Diode(LED) monitor |
is the technology used for display in flat screen, flat panel computer monitor or television. It has a very short depth and is light in terms of weight.
|
1
|
|
285 |
settings_ethernet
|
liquid crystal display(LCD) Monitor |
is the technology used for displays in notebook and other smaller computers.
|
1
|
|
284 |
settings_ethernet
|
Network interface card (NIC) |
is a circuit board or card that is installed in a computer so that it can be connected to a network.Note: if your computer doesn't have NIC or WNIC (wireless Network Interface Card) , you can't access to network.
|
1
|
|
283 |
settings_ethernet
|
Wi-Fi range extender |
Wi-Fi range extender, sometimes called a range expander, is a type of wireless repeater used to expand the reach of a wireless LAN. The device is situated in between a base router or access point and a client that is not close enough to receive acceptable service or one that is on the other side of a barrier.
|
1
|
|
282 |
settings_ethernet
|
de-encapsulation |
is the process of extract from bottom to top layer in OSI model by remove information component ( header, trailer..) from layer to other layer to get the real data. Example: de-encapsulation from bits to Frame, from frame to packet ….
|
1
|
|
281 |
settings_ethernet
|
Interface (on router) |
is the way we call physical port on router when view in logical way.
|
1
|
|
280 |
settings_ethernet
|
Reverse Address Resolution Protocol (RARP) |
is an obsolete computer networking protocol used by a client computer to request its Internet Protocol (IPv4) address from a computer network, when it's has Mac address. Note: ARP map or resolve from IPV4 to Mac address but RARP is map or resolve from Mac address to IPV4.
|
0
|
|
279 |
settings_ethernet
|
Internet layer ( TCP/IP) |
"is a layer in TCP/IP model that responsible how systems on different network segments find each other and define the best path to destination.
"
|
0
|
|
278 |
settings_ethernet
|
Physical layer (OSI) |
"is a layer in OSI model that responsible to convert packet or data in to bits that can transmition over media. Note: bits has two value 0 and 1.
"
|
0
|
|
277 |
settings_ethernet
|
Network layer (OSI) |
"is a layer in OSI model that responsible how systems on different network segments find each other. Note: In Network layer, it will add IP address to packet in order to send data to receiver in network.
"
|
0
|
|
276 |
settings_ethernet
|
Data link layer (OSI) |
"is a layer in OSI model that responsible for Frame that handle flow control and add Mac address in to frame. Note: It add source and destination Mac address to frame in order to finde way to destination and back to sender.
"
|
0
|
|
275 |
settings_ethernet
|
Transport layer (OSI) |
"is a layer in OSI model that responsible for break data into segments and assigns sequence number. Example: Your data has big size but when send to communicate with other computer, it will break down to small pieces and order by put sequence number.
"
|
0
|
|
274 |
settings_ethernet
|
Session layer (OSI) |
"is a layer in OSI model that responsible for establishing and maintaining connections. responsible for ports and ensures queries for services that application layer use. Example: If you want to access website, you will use browser. So it will add service: http or https and port: 80 or 443.
"
|
0
|
|
273 |
settings_ethernet
|
Presentation Layer (OSI) |
"is a layer in OSI model that responsible for ensure data is received in a useable format when recieve and data encryption is done when transmition. Ex. When you receive chat from your friends and can read, it mean useable format.
"
|
1
|
|
272 |
settings_ethernet
|
Application layer (OSI) |
"is a layer in OSI model that responsible for determining when the device need to access to the network is required. Example: you use skype chat to your friend, so it will determin how skype app access to network.
"
|
1
|
|
271 |
settings_ethernet
|
Transmission Control Protocol/Internet Protocol (TCP/IP) Model |
"is a model which describes the functions that occur at each layer of protocols which protocols work in which layer.
"
|
1
|
|
270 |
settings_ethernet
|
Open Systems Interconnection (OSI) model |
"is a model standard which is used for data network transmition, design, operation specification and troubleshooting in the network.
" |
1
|
|
269 |
settings_ethernet
|
Telnet |
is a network protocol that provides administrators with a unsecure way to access a remote computer, Router, Swich…Telnet keep data in plain text during remote that allow hacker can capture user name and password.
|
0
|
|
268 |
settings_ethernet
|
Secure Socket Shell (SSH) |
SSH, also known as Secure Socket Shell, is a network protocol that provides administrators with a secure way to access a remote computer, Router, Switch...SSH will encryption data during remote that protect from hacker capture user name and password.
|
0
|
|
267 |
settings_ethernet
|
Auxilary cable (AUX) |
is the cable use to connect access directly to switch or router with AUX port. AUX cable have two part of connector, one is SERIAL port that needs to connect to modem and other is Rolled cable connect to AUX port. We can connect access far from the work place because modem can connect with phone line.
|
1
|
|
266 |
settings_ethernet
|
Console Cable |
is the cable use to connect access directly to switch or router with console port. Console cable have two part of connector, one is SERIAL port that needs to go to the serial/COM port on your PC or laptop other one is a ROLLED cable.
|
2
|
|
265 |
settings_ethernet
|
shielded twisted-pair cable (STP) |
is the kind of special copper Twist pair that has covering or shield to attempt to prevent electromagnetic interference that effect to data during transfering.
|
1
|
|
264 |
settings_ethernet
|
Intranet |
is a private network accessible only to an organization's staff.
|
1
|
|
263 |
settings_ethernet
|
Intermediary Device |
is the device that make the path connects data from source to destination. Example: Switch, Router, Hub, bridge..
|
1
|
|
262 |
settings_ethernet
|
End Device |
is the device that use the last connection (endpoint) in a networked system. For example, a user's PC is an end device,Voip phone and so is a server. End device connect to with end device or to the network by Switch, Router or other equipment.
|
1
|
|
261 |
settings_ethernet
|
Fiber Optic |
Fiber optic (or "optical fiber") is the kind of media that use technology associated with the transmission of information as light impulses along a glass or plastic wire or fiber.
|
1
|
|
260 |
settings_ethernet
|
Scanner |
is a hardware input device for a computer. Scanners allow a user to take a printed picture, drawing, or document and convert it into a digital file (either an image or a text file) so that it can stored, viewed, and edited on a computer.
|
1
|
|
259 |
settings_ethernet
|
Local Printer |
is an external hardware output device responsible for taking electronic data stored on a computer generating a hard copy of that data and need to connect directly to computer. Note: Local printer don't have (Network Interface Card).
|
1
|
|
258 |
settings_ethernet
|
Extranet |
is a private network that uses Internet technology and the public telecommunication system to securely share part of a business's information or operations with suppliers, vendors, partners, customers, or other businesses.
|
1
|
|
257 |
settings_ethernet
|
IOE ( Internet of Everything) |
"Internet of Everything (IoE) is the networked connection of
people, process, data, and things to be connectedness creates as “everything” comes online."
|
1
|
|
221 |
settings_ethernet
|
Mouse |
is the device use to input signal in to computer in order to control the action movement object on the graphic interface.
|
1
|
|
220 |
settings_ethernet
|
Frame |
is the data in Data link layer of OSI Model that contains a header field and a trailer field. In Frame header field, has source and Destination MAC address.
|
1
|
|