ZyXEL Communications Prestige 964 User Manual page 50

Cable router
Hide thumbs Also See for Prestige 964:
Table of Contents

Advertisement

Prestige 944S Cable Sharing Gateway with 4-port Switch
becomes the standard and no further comments or changes are permitted. Change can occur,
however, through subsequent RFCs.
RIP
Routing Information Protocol is an interior or intra-domain routing protocol that uses the
distance-vector routing algorithms. RIP is used on the Internet and is common in the NetWare
environment as a method for exchanging routing information between routers.
Router
A device that connects two networks together. Routers monitor, direct, and filter information that
passes between these networks. Because of their location, routers are a good place to install
traffic or mail filters. Routers are also prone to attacks because they contain a great deal of
information about a network.
SAP
In NetWare, the SAP (Service Advertising Protocol) broadcasts information about available
services on the network that other network devices can listen to. A server sends out SAP
messages every 60 seconds. A server also sends out SAP messages to inform other devices that it
is closing down. Workstations use SAP to find services they need on the network.
SATAN
A UNIX program that gathers information on networks and stores it in databases. It is helpful in
finding security flaws such as incorrect settings, software bugs and poor policy decisions. It
shows network services that are running, the different types of hardware and software on the
network, and other information. It was written to help users find security flaws in their network
systems.
Server
A computer, or a software package, that provides a specific kind of service to client software
running on other computers.
A set-top box is a device that enables a television set to become a user interface to the Internet
Set-Top Box
and also enables a television set to receive and decode digital television (DTV) broadcasts.
Shoulder Surfing
Looking over someone's shoulder to see the numbers they dial on a phone, or the information
they enter into a computer.
Used in the DOCSIS standard to define a particular mapping between a cable modem (CM) and
SID (Service ID)
the CMTS. The SID is used for the purpose of upstream bandwidth allocation and
class-of-service management.
SNMP
System Network Management Protocol is a popular management protocol defined by the Internet
community for TCP/IP networks. It is a communication protocol for collecting information from
devices on the network.
Snooping
Passively watching a network for information that could be used to a hacker's advantage, such as
passwords. Usually done while Camping Out.
SOCKS
A protocol that handles TCP traffic through proxy servers.
SPAM
Unwanted e-mail, usually in the form of advertisements.
Passive devices that divide the traffic on trunk cables and send it down feeder cables.
Splitter
Spoofing
To forge something, such as an IP address. IP Spoofing is a common way for hackers to hide
their location and identity
SSL (Secured Socket
Technology that allows you to send information that only the server can read. SSL allows servers
Layer)
and browsers to encrypt data as they communicate with each other. This makes it very difficult
for third parties to understand the communications.
STP
Twisted-pair cable consists of copper-core wires surrounded by an insulator. Two wires are
twisted together to form a pair, and the pair form a balanced circuit. The twisting prevents
interference problems. STP (shielded twisted-pair) provides protection against external crosstalk.
Straight through
A cable that wires a pin to its equivalent pin. This cable connects two dissimilar devices, for
L
Glossary

Advertisement

Table of Contents
loading

Table of Contents