Discover millions of ebooks, audiobooks, and so much more with a free trial

Only $11.99/month after trial. Cancel anytime.

Top Networking Terms You Should Know
Top Networking Terms You Should Know
Top Networking Terms You Should Know
Ebook207 pages2 hours

Top Networking Terms You Should Know

Rating: 0 out of 5 stars

()

Read preview

About this ebook

This document will provide a basic overview of some important terms, which are frequently used in context of Computer Networks.

LanguageEnglish
PublisherJohn Smith
Release dateJun 27, 2020
ISBN9781393984320
Top Networking Terms You Should Know

Read more from John Smith

Related to Top Networking Terms You Should Know

Related ebooks

Networking For You

View More

Related articles

Reviews for Top Networking Terms You Should Know

Rating: 0 out of 5 stars
0 ratings

0 ratings0 reviews

What did you think?

Tap to rate

Review must be at least 10 words

    Book preview

    Top Networking Terms You Should Know - JOHN SMITH

    Table of Contents

    Cover

    Top Networking Terms You Should Know

    Chapter - 1

    Chapter - 2

    Chapter - 3

    Chapter - 4

    Chapter - 5

    Chapter - 6

    Chapter - 7

    Chapter - 8

    Chapter - 9

    Chapter - 10

    Chapter - 11

    Chapter - 12

    Chapter - 13

    Chapter - 14

    Chapter - 15

    Chapter - 16

    Chapter - 17

    Chapter - 18

    Chapter - 19

    Chapter - 20

    Chapter - 21

    Chapter - 22

    Chapter - 23

    Chapter - 24

    Chapter - 25

    Chapter - 26

    Chapter - 27

    Chapter - 28

    Chapter - 29

    Chapter - 30

    Chapter - 31

    Chapter - 32

    Imprint

    Top Networking Terms You Should Know

    Chapter - 1

    Security Orchestration, Automation and Response

    Security Orchestration, Automation and Response (SOAR) is an IT stack helping companies and organizations to deal with security threats. In a collection of physical and digital security tools, SOAR provides an architecture for optimal security response. For example, a SOAR resource set could include new kinds of software packages that run on top of firewalls or perimeter security hardware, arranging new and more sophisticated processes beyond simple perimeter security.

    Asynchronous Transfer Mode

    Asynchronous transfer mode (ATM) is a switching technique used by telecommunication networks that uses asynchronous time-division multiplexing to encode data into small, fixed-sized cells. This is different from Ethernet or internet, which use variable packet sizes for data or frames. ATM is the core protocol used over the synchronous optical network (SONET) backbone of the integrated digital services network (ISDN).

    Cheezburger

    The word cheezburger, misspelled with a z, is based on the idea that cats, if they could write to humans, would have a primitive control of the English language, and would misspell most words. This kind of language has been called lolspeak after the phenomenon of lolcatz hit the Internet in the mid-2000s.

    Data Bleed

    The term data bleed is now somewhat popular, but also a little hard to define, since the term itself is not well defined on the internet. In general, data bleed occurs when there is not transparency into data use, and users or other parties experience mysterious data quantification, or where data transfers happen without the express permission of the user.

    Easter Egg

    An Easter egg is a hidden video game feature or surprise. Easter eggs are usually unlocked by using certain techniques to complete in-game tasks, entering specific button combinations or acquiring access to secret game or game file areas.

    Hackathon

    A hackathon is a gathering where programmers collaboratively code in an extreme manner over a short period of time. Hackathons are at least a few days - or over a weekend - and generally no longer than a week. While working on a particular project, the idea is for each developer to have the ability and freedom to work on whatever he/she wants. A hackathon is also known as a hackfest or hack day.

     Yoyo Mode

    Yoyo mode refers to a situation wherein a computer or a similar device seems stuck in a loop -- turning on briefly, then turning off again. The idea is that the rapid restart and shut off patterns can be compared to the down and up cycles of a yoyo.

    Lexeme

    A lexeme is a sequence of alphanumeric characters in a token. The term is used in both the study of language and in the lexical analysis of computer program compilation. In the context of computer programming, lexemes are part of the input stream from which tokens are identified. An invalid or illegal token produces an error. A lexeme is one of the building blocks of language.

    Cyber Kill Chain

    A cyber kill chain is a collection of processes related to the use of cyberattacks on systems. Some experts describe the cyber kill chain as representing the stages of a cyberattack. In general, the cyber kill chain is a step-by-step description of what a complex attack does.

    Mechatronics

    Mechatronics is a broad engineering field that is based on evaluating mechanical and electrical engineering systems, and working with mechanical and electrical systems. Mechatronics blends mechanical skills and tasks with electronic design. It is sometimes seen as a field similar to robotics.

    Evolutionary Algorithm

    An evolutionary algorithm is considered a component of evolutionary computation in artificial intelligence. An evolutionary algorithm functions through the selection process in which the least fit members of the population set are eliminated, whereas the fit members are allowed to survive and continue until better solutions are determined. In other words, evolutionary algorithms are computer applications which mimic biological processes in order to solve complex problems. Over time, the successful members evolve to present the optimized solution to the problem.

    OpenDNS

    OpenDNS is the name of a Domain Name System (DNS) service as well as of the company that provides that service. The OpenDNS service extends the DNS by incorporating features such as content filtering and phishing protection. It is also touted as faster, more reliable and having zero downtime because of its global network of DNS servers that ensures that, if one or two servers are down, the others can still carry the slack.

    Cloud Spanning

    Cloud Spanning is a type of cloud delivery model in which an application is deployed and executed over multiple simultaneous cloud platforms and infrastructure. Cloud spanning enables a cloud application to distribute its computations and components across one or more cloud environments.

    Always On

    The tech term always onor always-on refers to systems that are continuously available, plugged in, or connected to power sources and networks. Always on may also refer to systems that are continually operational - that do not take breaks, but continue to hum along through all hours of the day.

    Brute Force Attack

    A brute force attack is a trial-and-error method used to obtain information such as a user password or personal identification number (PIN). In a brute force attack, automated software is used to generate a large number of consecutive guesses as to the value of the desired data. Brute force attacks may be used by criminals to crack encrypted data, or by security analysts to test an organization's network security.  A brute force attack is also known as brute force cracking or simply brute force.

    Hakspeak

    Hakspeak is a type of alternative text representation for certain words or characters. It involves substituting numbers or symbols for letters of the English or western alphabet. Other hakspeak systems may also exist for other world languages and alphabets.  Based on the term hacker, hakspeak has evolved into a kind of common code used to transmit messages in secret ways geared toward confusing those who are not knowledgeable about the hakspeak system. Hakspeak is also known as leetspeak, leet speak and leetspeek.

    Runtime Error

    Runtime error refers to an error that takes place while executing a program. As opposed to the compilation errors that occur during a program compilation, runtime errors occur only during the execution of the program. Runtime errors imply bugs in the program or issues that the developers had expected but were unable to correct. For example, insufficient memory can often trigger a runtime error. Runtime errors usually appear in a message box that includes a specific error code coupled with its corresponding description. It is quite common that the computer becomes noticeably slow prior to the appearance of a runtime error.

    Bitmap

    Bitmap (BMP) is an image file format that can be used to create and store computer graphics. A bitmap file displays a small dots in a pattern that, when viewed from afar, creates an overall image. A bitmap image is a grid made of rows and columns where a specific cell is given a value that fills it in or leaves it blank, thus creating an image out of the data.

    Internet Protocol Security

    Internet protocol security (IPsec) is a set of protocols that provides security for Internet Protocol. It can use cryptography to provide security. IPsec can be used for the setting up of virtual private networks (VPNs) in a secure manner. Also known as IP Security.

    Internet of Things

    The internet of things (IoT) is a computing concept that describes the idea of everyday physical objects being connected to the internet and being able to identify themselves to other devices. The term is closely identified with RFID as the method of communication, although it also may include other sensor technologies, wireless technologies or QR codes.

    The IoT is significant because an object that can represent itself digitally becomes something greater than the object by itself. No longer does the object relate just to its user, but is now connected to surrounding objects and database data. When many objects act in unison, they are known as having ambient intelligence.

    Internet of Everything

    The Internet of Everything (IoE) is a broad term that refers to devices and consumer products connected to the Internet and outfitted with expanded digital features. It is a philosophy in which technology's future is comprised of many different types of appliances, devices and items connected to the global Internet.  The term is somewhat synonymous with the Internet of Things (IoT).

    Outlier Detection

    Outlier detection is the process of detecting and subsequently excluding outliers from a given set of data.  An outlier may be defined as a piece of data or observation that deviates drastically from the given norm or average of the data set. An outlier may be caused simply by chance, but it may also indicate measurement error or that the given data set has a heavy-tailed distribution.

    Here is a simple scenario in outlier detection, a measurement process consistently produces readouts between 1 and 10, but in some rare cases we get measurements of greater than 20.  These rare measurements beyond the norm are called outliers since they lie outside the normal distribution curve.

    Hyperconverged Infrastructure

    A hyperconverged infrastructure is an infrastructure model that utilizes a software-centric architecture and has a tight integration with the storage, networking, computing and virtualization software and hardware resources. A hyper-converged infrastructure enables the management of all the integrated resources from a single common toolset. A hyper-converged infrastructure is an improvement over a converged infrastructure, where the vendor provides a preconfigured bundle of software and hardware as a single unit. This type of infrastructure reduces complexity and helps simplify management of resources.  A hyper-converged infrastructure is also known as hyperconvergence.

    3V's

    3V's is a term used to define the different attributes of big data: volume, variety and velocity. In 2001, the 3V's term was coined to define the constructs or attributes that make up an organization's stored and owned data repositories. 3V's is now used to define the trends and dimensions of big data.

    Bit Stuffing

    Bit stuffing is the process of inserting noninformation bits into data to break up bit patterns to affect the synchronous transmission of information. It is widely used in network and communication protocols, in which bit stuffing is a required part of the transmission process. Bit stuffing is commonly used to bring bit streams up to a common transmission rate or to fill frames. Bit stuffing is also used for run-length limited coding.

    Kali Linux

    Kali Linux is a Linux distribution that is specialized for cybersecurity. It is an open-source product that involves a lot of customization for penetration testing, which helps companies to understand their vulnerabilities.

    Informatics

    Informatics is the study of the behavior and structure of any system that generates, stores, processes and then presents information; it is basically the science of information. The field takes into consideration the interaction between the information systems and the user, as well as the construction of the interfaces between the two, such as the user interface.

    DNA Digital Data Storage

    DNA digital data storage is the idea of encoding binary data in a DNA molecule and strand. It is a cutting-edge theory of data storage that represents the new frontier of where technology is going in the 21st century along with other major theoretical advances like quantum computing.  DNA digital data storage is also known as DNA-based data storage, DNA data storage or DNA storage.

    Cloud Sprawl

    Cloud sprawl is the uncontrolled proliferation of an organization’s cloud instances or cloud presence.  It happens when an organization inadequately controls, monitors and manages its different cloud instances, resulting in numerous individual cloud instances which may then be forgotten but continue to use up resources or incur costs since most organizations pay for public cloud services.

    Business Continuity Management

    Business continuity management (BCM) refers to the management of core conceptual resources that address future threats to a business and help business leaders handle the impacts of these threats.  This term is in the same vein of others, like business continuity planning (BCP), where business leaders

    Enjoying the preview?
    Page 1 of 1