ZyXEL Communications ZyXEL ZyAIR A-6000 User Manual page 41

High speed, long range ethernet wireless bridge
Hide thumbs Also See for ZyXEL ZyAIR A-6000:
Table of Contents

Advertisement

Flash memory
FTP
Gateway
Hacker
HDLC
Host
HTTP
IANA
ICMP
Integrity
internet
Internet
Internet Worm
Intranet
Intruder
IP
IPCP (PPP)
IPX
IRC
CLI commands
The nonvolatile storage that can be electrically erased and reprogrammed so
that data can be stored, booted, and rewritten as necessary.
File Transfer Protocol is an Internet file transfer service that operates on the
Internet and over TCP/IP networks. FTP is basically a client/server protocol in
which a system running the FTP server accepts commands from a system
running an FTP client. The service allows users to send commands to the
server for uploading and downloading files. FTP is popular on the Internet
because it allows for speedy transfer of large files between two systems.
A gateway is a computer system or other device that acts as a translator
between two systems that do not use the same communication protocols, data
formatting structures, languages, and/or architecture.
Generally, a hacker is anyone who enjoys experimenting with technology
including computers and networks. Not all hackers are criminals breaking into
systems. Some are legitimate users and hobbyists. Nevertheless, some are
dedicated criminals or vandals.
HDLC (High-level Data Link Control) is a bit-oriented (the data is monitored bit
by bit), link layer protocol for the transmission of data over synchronous
networks.
Any computer on a network that is a repository for services available to other
computers on the network. It is quite common to have one host machine provide
several services, such as WWW and USENET.
Hyper Text Transfer Protocol. The most common protocol used on the Internet.
HTTP is the primary protocol used for web sites and web browsers. It is also
prone to certain kinds of attacks.
Internet Assigned Number Authority acts as the clearinghouse to assign and
coordinate the use of numerous Internet protocol parameters such as Internet
addresses, domain names, protocol numbers, and more. The IANA Web site is
at http://www.isi.edu/iana.
Internet Control Message Protocol is a message control and error-reporting
protocol between a host server and a gateway to the Internet. ICMP uses
Internet Protocol (IP) datagrams, but the messages are processed by the
TCP/IP software and are not directly apparent to the application user.
Proof that the data is the same as originally intended. Unauthorized software or
people have not altered the original information.
(Lower case i) Any time you connect 2 or more networks together, you have an
internet.
(Upper case I) The vast collection of inter-connected networks that all use the
TCP/IP protocols and that evolved from the ARPANET of the late 60's and early
70's. The Internet now (July 1995) connects roughly 60,000 independent
networks into a vast global internet
See Worm.
A private network inside a company or organization that uses the same kinds of
software that you would find on the public Internet, but that is only for internal
use.
Person or software interested in breaking computer security to access, modify,
or damage data. Also see Cracker.
Internet Protocol, is the underlying protocol for routing packets on the Internet
and other TCP/IP-based networks.
IP Control Protocol allows changes to IP parameters such as the IP address.
Internetwork Packet eXchange The native NetWare internetworking protocol is
IPX (Internetwork Packet Exchange). Like IP (Internet Protocol), IPX is an
internetworking protocol that provides datagram services.
Internet Relay Chat. IRC was developed in the late 1980s as a way for multiple
users on a system to "chat" over the network. Today IRC is a very popular way
to "talk" in real time with other people on the Internet. However, IRC is also one
avenue hackers use to get information from you about your system and your
company. Moreover, IRC sessions are prone to numerous attacks that while not
A-6000 High Speed, Long Range Ethernet Wireless Bridge
5-3

Advertisement

Table of Contents
loading

Table of Contents