Computer Networking First-Step

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W]

security

     accounting 2nd

     anti-virus software 2nd

     authentication 2nd 3rd

         CHAP 2nd

         PAP 2nd 3rd

         with username and password 2nd 3rd

     authorization 2nd

     firewalls 2nd 3rd 4th

         DMZs 2nd

         traffic filtering logic 2nd 3rd

     identifying allowable traffic on enterprise network Internet connection 2nd 3rd 4th

     IDSs

         network-based

         signatures

     VPNs 2nd 3rd

segmentation

     TCP

segments

     mss

     TCP

     versus packets

sending email

sequence number field

     TCP header

sequence numbers

serial interfaces

     CSU/DSU

serial links 2nd

     addressing 2nd 3rd

SEs (sales engineers)

signatures

single broadcast domains

single site networks

SMTP 2nd

     and POP3

snail mail

Sneakernet

sniffers 2nd

software

     email client

source address field

     Ethernet header 2nd 3rd

source IP address field 2nd

standards 2nd

     encoding

     Ethernet

     networking models

         proprietary 2nd

         public 2nd 3rd 4th 5th

     OSI reference model 2nd

standards (networking)

     data transmission 2nd

         electrical interference

         error recovery

standards bodies

     IEEE

     ITU

static IP routes 2nd

static routes

STP (shielded twisted pair)

straight-through cables

structured wiring plans 2nd 3rd

subnets

     directly connected 2nd

     end-to-end routing process 2nd 3rd

subnetting 2nd 3rd 4th 5th 6th

switch ports 2nd

switches

     autonegotiation 2nd

    creating multiple physical LANs

         devices:switches:creating multiple physical LANs 2nd

     flooding 2nd

     forwarding decisions

     Frame Relay

     MAC address table

    MAC addresses

         learning 2nd

     reducing congestion 2nd 3rd

         buffers 2nd 3rd

         full-duplex transmission

     supporting multiple speeds

     trunking 2nd 3rd

     trunks

    VLANs

         creating 2nd 3rd

         forwarding decisions

         frame forwarding 2nd

         reasons for implementing 2nd

SYN flag bit

SYN flag bit (TCP)

Категории