Sie sind auf Seite 1von 12

What is a Network Protocol A protocol is a set of rules that governs the communications between computers on a network.

These rules include guidelines that regulate the following characteristics of a network: access method, allowed physical topologies, types of cabling, and speed of data transfer. Types of Network Protocols The most common network protocols are: Ethernet Local Talk Token Ring !!" AT# Ethernet The Ethernet protocol is by far the most widely used. Ethernet uses an access method called $%#A&$! '$arrier %ense #ultiple Access&$ollision !etection(. This is a system where each computer listens to the cable before sending anything through the network. "f the network is clear, the computer will transmit. "f some other node is already transmitting on the cable, the computer will wait and try again when the line is clear. %ometimes, two computers attempt to transmit at the same instant. )hen this happens a collision occurs. Each computer then backs off and waits a random amount of time before attempting to retransmit. )ith this access method, it is normal to have collisions. *owever, the delay caused by collisions and retransmitting is very small and does not normally effect the speed of transmission on the network. The Ethernet protocol allows for linear bus, star, or tree topologies. !ata can be transmitted over wireless access points, twisted pair, coa+ial, or fiber optic cable at a speed of ,- #bps up to ,--- #bps. ATM Asynchronous Transfer #ode 'AT#( is a network protocol that transmits data at a speed of ,.. #bps and higher. AT# works by transmitting all data in small packets of a fi+ed si/e0 whereas, other protocols transfer variable length packets. AT# supports a variety of media such as video, $!12uality audio, and imaging. AT# employs a star topology, which can work with fiber optic as well as twisted pair cable. AT# is most often used to interconnect two or more local area networks. "t is also fre2uently used by "nternet %ervice 3roviders to utili/e high1speed access to the "nternet for their clients. As AT# technology becomes more cost1effective, it will provide another solution for constructing faster local area networks. Gigabit Ethernet The most recent development in the Ethernet standard is a protocol that has a transmission speed of , 4bps. 4igabit Ethernet is primarily used for backbones on a network at this time. "n the future, it will probably be used for workstation and server connections also. "t can be used with both fiber optic cabling and copper. The ,---5aseT6, the copper cable used for 4igabit Ethernet, is e+pected to become the formal standard in ,777. Compare the Network Protocols Protocol Cable Speed Topology Ethernet Twisted iber 3air, $oa+ial, ,- #bps ,-- #bps .89 #bps : #bps #bps ,-- #bps ,..18:<< #bps 1 ,; Linear 5us, %tar, Tree %tar Linear 5us or %tar %tar1)ired Ring !ual ring Linear 5us, %tar, Tree

ast Ethernet Twisted 3air, iber LocalTalk Twisted 3air

Token Ring Twisted 3air !!" AT# iber Twisted 3air, iber

Network Categories T!3&"3 includes a wide range of protocols which are used for a variety of purposes on the network. The set of protocols that are a part of T$3&"3 is called the T$3&"3 protocol stack or the T$3&"3 suite of protocols. $onsidering the many protocols, message types, levels, and services that T$3&"3 networking supports, " believe it would be very helpful to categori/e the various protocols that support T$3&"3 networking and define their respective contribution to the operation of networking. =nfortunately " have never seen this done to any real e+tent, but believe it would be worthwhile to help those learning networking understand it faster and better. " cannot guarantee that e+perts ,

will agree with the categori/ations that will be provided here, but they should help the reader get the big picture on the various protocols, and thus clarify what the reason or need is for each protocol. As mentioned previously, there are four T$3&"3 layers. They are link, network, transport, and application. The link layer is the hardware layer that provides ability to send messages between multiple locations. "n the case of this document, ethernet provides this capability. 5elow " define several categories some of which fit into the : layer protocol levels described earlier. " also define a relative fundamental importance to the ability of the network to function at all. "mportance includes essential, critical, important, advanced, useful. ,. Essential 1 )ithout this all other categories are irrelevant. 8. $ritical 1 The network, as designed, is useless without this ability. 9. "mportant 1 The network could function, but would be difficult to use and manage. :. Advanced 1 "ncludes enhancements that make the network easier to use and manage. .. =seful 1 unctionality that you would like to be able to use as a network user. Applications or some functionality is supported here. )ithout this, why build a network The categories are: >ame'layer( "mportance >ames of protocols )hat it does ethernet, %L"3, 333, Allows messages to be packaged and *ardware'link( Essential Token Ring, AR$net sent between physical locations. #anages movement of messages and 3ackage reports errors. "t uses message Essential "3, "$#3 management'network( protocols and software to manage this process. 'includes routing( $ommunicates between layers to "nter layer allow one layer to get information to Essential AR3 communication support another layer. This includes broadcasting $ontrols the management of service %ervice between computers. 5ased on values $ritical T$3, =!3 control'transport( in T$3 and =!3 messages a server knows what service is being re2uested. !>% provides address to name Application and user translation for locations and network "mportant !>%, R3$ support cards. R3$ allows remote computer to perform functions on other computers. RAR3, 5??T3, !*$3, "4#3, Enhances network management and >etwork #anagement Advanced %>#3,R"3, ?%3 , increases functionality 543, $"!R T3, T T3, %#T3, =tility'Application( =seful Telnet, > %, ping, 3rovides direct services to the user. Rlogin There are e+ceptions to my categori/ations that don@t fit into the normal layering scheme, such as "4#3 is normally part of the link layer, but " have tried to list these categori/ations according to network functions and their relative importance to the operation of the network. Also note that ethernet, which is not really a protocol, but an "EEE standard along with 333, %L"3, TokenRing, and Arc>et are not T$3&"3 protocols but may support T$3&"3 at the hardware or link layer, depending on the network topology. The list below gives a brief description of each protocol ethernet 1 3rovides for transport of information between physical locations on ethernet cable. !ata is passed in ethernet packets %L"3 1 %erial line "3 '%L"3(, a form of data encapsulation for serial lines. 333 1 3oint to point protocol '333(. A form of serial line data encapsulation that is an improvement over %L"3. "3 1 "nternet 3rotocol '"3(. E+cept for AR3 and RAR3 all protocols@ data packets will be packaged into an "3 data packet. 3rovides the mechanism to use software to address and manage data packets being sent to computers. "$#3 1 "nternet control message protocol '"$#3( provides management and error reporting to help manage the process of sending data between computers. AR3 1 Address resolution protocol 'AR3( enables the packaging of "3 data into ethernet packages. "t is the system and messaging protocol that is used to find the ethernet 'hardware( address from a specific "3 number. )ithout this protocol, the ethernet 8

package could not be generated from the "3 package, because the ethernet address could not be determined. T$3 1 A reliable connection oriented protocol used to control the management of application level services between computers. =!3 1 An unreliable connection less protocol used to control the management of application level services between computers. !>% 1 !omain >ame %ervice, allows the network to determine "3 addresses from names and vice versa. RAR3 1 Reverse address resolution protocol 'RAR3( is used to allow a computer without a local permanent data storage media to determine its "3 address from its ethernet address. 5??T3 1 5ootstrap protocol is used to assign an "3 address to diskless computers and tell it what server and file to load which will provide it with an operating system. !*$3 1 !ynamic host configuration protocol '!*$3( is a method of assigning and controlling the "3 addresses of computers on a given network. "t is a server based service that automatically assigns "3 numbers when a computer boots. This way the "3 address of a computer does not need to be assigned manually. This makes changing networks easier to manage. !*$3 can perform all the functions of 5??T3. "4#3 1 "nternet 4roup #anagement 3rotocol used to support multicasting. %>#3 1 %imple >etwork #anagement 3rotocol '%>#3(. =sed to manage all types of network elements based on various data sent and received. R"3 1 Routing "nformation 3rotocol 'R"3(, used to dynamically update router tables on )A>s or the internet. ?%3 1 ?pen %hortest 3ath irst '?%3 ( dynamic routing protocol. 543 1 5order 4ateway 3rotocol '543(. A dynamic router protocol to communicate between routers on different systems. $"!R 1 $lassless "nterdomain Routing '$"!R(. T3 1 ile Transfer 3rotocol ' T3(. Allows file transfer between two computers with login re2uired. T T3 1 Trivial ile Transfer 3rotocol 'T T3(. Allows file transfer between two computers with no login re2uired. "t is limited, and is intended for diskless stations. %#T3 1 %imple #ail Transfer 3rotocol '%#T3(. > % 1 >etwork ile %ystem '> %(. A protocol that allows =>"6 and Linu+ systems remotely mount each other@s file systems. Telnet 1 A method of opening a user session on a remote host. 3ing 1 A program that uses "$#3 to send diagnostic messages to other computers to tell if they are reachable over the network. Rlogin 1 Remote login between =>"6 hosts. This is outdated and is replaced by Telnet. Each protocol ultimately has it@s data packets wrapped in an ethernet, %L"3, or 333 packet 'at the link level( in order to be sent over the ethernet cable. %ome protocol data packets are wrapped se2uentially multiple times before being sent. or e+ample T3 data is wrapped in a T$3 packet which is wrapped in a "3 packet which is wrapped in a link packet 'normally ethernet(. The diagram below shows the relationship between the protocols@ se2uential wrapping of data packets. What is Network Topology The physical topology of a network refers to the configuration of cables, computers, and other peripherals. 3hysical topology should not be confused with logical topology which is the method used to pass information between workstations >etwork topologies are categori/ed into the following basic types: %tar Topology Ring Topology 5us Topology Tree Topology #esh Topology *ybrid Topology Star Topology #any home networks use the star topology. A star network features a central connection point called a AhubA that may be a hub, switch or router. !evices typically connect to the hub with =nshielded Twisted 3air '=T3( Ethernet. %ee the illustration of %tar >etwork Topology.

Advantages of a %tar Topology Easy to install and wire. >o disruptions to the network then connecting or removing devices. Easy to detect faults and to remove parts. !isadvantages of a %tar Topology Re2uires more cable length than a linear topology. "f the hub or concentrator fails, nodes attached are disabled. #ore e+pensive than linear bus topologies because of the cost of the concentrators. ing Topology "n a ring network, every device has e+actly two neighbors for communication purposes. All messages travel through a ring in the same direction 'either AclockwiseA or AcounterclockwiseA(. A failure in any cable or device breaks the loop and can take down the entire network. !"s Topology 5us networks 'not to be confused with the system bus of a computer( use a common backbone to connect all devices. A single cable, the backbone functions as a shared communication medium that devices attach or tap into with an interface connector. A device wanting to communicate with another device on the network sends a broadcast message onto the wire that all other devices see, but only the intended recipient actually accepts and processes the message. Tree Topology Tree topologies integrate multiple star topologies together onto a bus. "n its simplest form, only hub devices connect directly to the tree bus, and each hub functions as the ArootA of a tree of devices. This bus&star hybrid approach supports future e+pandability of the network much better than a bus 'limited in the number of devices due to the broadcast traffic it generates( or a star 'limited by the number of hub connection points( alone. %ee the illustration of Tree >etwork Topology.

Mesh Topology #esh topologies involve the concept of routes. =nlike each of the previous topologies, messages sent on a mesh network can take any of several possible paths from source to destination. 'Recall that even in a ring, although two cable paths e+ist, messages can only travel in one direction.( %ome )A>s, most notably the "nternet, employ mesh routing. #ybrid Topology A combination of any two or more network topologies. >ote ,: "nstances can occur where two basic network topologies, when connected together, can still retain the basic network character, and therefore not be a hybrid network. or e+ample, a tree network connected to a tree network is still a tree network. Therefore, a hybrid network accrues only when two basic networks are connected and the resulting network topology fails to meet one of the basic topology definitions. or e+ample, two star networks connected together e+hibit hybrid network topologies. >ote 8: A hybrid topology always accrues when two different basic network topologies are connected. ARP and RARP Address Translation Address Resolution 3rotocol 'AR3( provides a completely different function to the network than Reverse Address Resolution 3rotocol 'RAR3(. AR3 is used to resolve the ethernet address of a >"$ from an "3 address in order to construct an ethernet packet around an "3 data packet. This must happen in order to send any data across the network. Reverse address resolution protocol 'RAR3( is used for diskless computers to determine their "3 address using the network. $nternet Protocol "nternet 3rotocol '"3( provides support at the network layer of the ?%" model. All transport protocol data packets such as =!3 or T$3 are encapsulated in "3 data packets to be carried from :

one host to another. "3 is a connection1less unreliable service meaning there is no guarantee that the data will reach the intended host. The datagrams may be damaged upon arrival, out of order, or not arrive at all '%ounds like some mail services, doesn@t itB(. Therefore the layers above "3 such as T$3 are responsible for being sure correct data is delivered. "3 provides for: Addressing. Type of service specification. ragmentation and re1assembly. %ecurity. Transmission Control Protocol Transmission $ontrol 3rotocol 'T$3( supports the network at the transport layer. Transmission $ontrol 3rotocol 'T$3( provides a reliable connection oriented service. $onnection oriented means both the client and server must open the connection before data is sent. T$3 is defined by R $ C79 and ,,88. T$3 provides: End to end reliability. !ata packet re se2uencing. low control. T$3 relies on the "3 service at the network layer to deliver data to the host. %ince "3 is not reliable with regard to message 2uality or delivery, T$3 must make provisions to be sure messages are delivered on time and correctly ' ederal E+pressB(. %ser &atagram Protocol =ser !atagram 3rotocol '=!3( supports the network at the transport layer. =ser !atagram 3rotocol '=!3( is an unreliable connection1less protocol and is defined by R $ C;< and ,,88. "t is a datagram service. There is no guarantee that the data will reach its destination. =!3 is meant to provide serivce with very little transmission overhead. "t adds very little to "3 datapackets e+cept for some error checking and port direction 'Remember, =!3 encapsulates "3 packets(. The following protocols or services use =!3: !>% %>#3 5??T3 T T3 > % R3$ R"3 Network 'ile System (N'S) > %, defined by R $ ,-7:, is a method for client systems to use a filesystem on a remote host computer. > % uses the =!3 protocol and is supported by R3$. emote Proced"re Call ( PC) R3$, defined by R $ ,-.C, is a set of function calls used by a client program to call functions in a remote server program. The port mapper program is the program used to keep track of which ports programs supporting R3$ functions use. The port mappers port is ,,,. "n Redhat Linu+ the portmapper daemon is started in the &etc&rc.d&init.d&portmap and the daemon program is called AportmapA. E*ample of !roadcasting ,. AR3 on "3 8. !*$3 on "3 9. Routing table updates. 5roadcasts sent by routers with routing table updates to other routers. E*ample of M"lticasting *ierarchical !istance Dector #ulticast Routing 3rotocol '*!D#R3( #ulticast 5order 4ateway 3rotocol "ndependent #ulticast $nternet Gro"p Management Protocol "nternet 4roup #anagement 3rotocol '"4#3( is the protocol used to support multicasting. To use multicasting, a process on a host must be able to Eoin and leave a group. A process is a user program that is using the network. 4roup access is identified by the group address and the interface '>"$(. &ynamic o"ting !ynamic routing performs the same function as static routing e+cept it is more robust. %tatic routing allows routing tables in specific routers to be set up in a static manner so network routes for packets are set. "f a router on the route goes down the destination may become unreachable. !ynamic routing allows routing tables in routers to change as the possible routes change. There are several protocols used to support dynamic routing including R"3 and ?%3 . .

Simple Network Management Protocol %imple >etwork #anagement 3rotocol '%>#3( is used as the transport protocol for network management. >etwork management consists of network management stations communicating with network elements such as hosts, routers, servers, or printers. Network Terms ,. A!%3 1 AppleTalk data stream protocol manages the flow of data between two established socket connections. 8. AE3 1 AppleTalk echo protocol uses echoes to tell if a computer, or node, is available. 9. A 3 1 AppleTalk iling protocol 1 #akes network files appear local by managing file sharing at the presentation layer. :. A43 1 Accelerated 4raphics 3ort. This bus is developed for fast video cards. "t is currently up to :6 mode speed. .. A#3% 1 Advanced #obile 3hone %ervice is analog cellular phone service. ;. A3" 1 Application 3rogramming "nterface. C. A33$ 1 Advanced 3eer1to13eer $ommunications provides peer to peer services at the transport and session layer. <. A33> 1 Advanced 3eer1to13eer >etworking supports the computer connections at the network and transport layers. 7. Architecture 1 The method that is used to transmit packets on a network. %ometimes the term architecture includes topology. An e+ample is ethernet. ,-. AR$net 1 Attached Resource $omputer >etwork is an architecture using star and bus topology. ,,. AR3 1 Address resolution 3rotocol is used to resolve the hardware address of a card to package the ethernet data. "t works at the data link layer. R $ <8;. ,8. AR=3 1 AppleTalk update routing is a newer version of RT#3. ,9. A%3 1 AppleTalk session protocol controls the starting and ending of sessions between computers called nodes. "t works at the session level. ,:. A%3 1 Active %erver 3ages is #icrosoft@s web server technology which can run Disual 5asic or FADA script. ,.. AT# 1 Asynchronous Transfer #ode may be used over a variety of media with both baseband and broadband systems. "t uses fi+ed length data packets of .9 bytes called cell switching. ,;. AT3 1 AppleTalk Transaction 3rotocol provides a Transport Layer connection between computers. ,C. attenuation 1 signal loss due to impedance. ,<. A= 1 Access =nit provides access to resources like fa+, tele+, and telete+. ,7. 5ackbone 1 #ain cable used to connect computers on a network. 8-. 5andwidth 1 "ndicates the amount of data that can be sent in a time period. #easured in #bps which is one million bits per second. 8,. 5aseband 1 !ata bits are defined by discrete signal changes. 88. 5!$ 1 5ackup !omain $ontroller is a backup for a 3!$ 89. 543 1 5order 4ateway 3rotocol, a dynamic routing protocol. R $ ,8;C. 8:. 5>$ 1 5ritish >aval $onnector. 8.. 5??T3 1 5oot 3rotocol. R $ 7.,, ,.:8. 8;. 5ridge 1 Read the outermost section of data on the data packet, to tell where the message is going. "t reduces the traffic on other network segments, since it does not send all packets but only sends packets intended for that segment they are attached to. 8C. 5roadband 1 =ses analog signals to divide the cable into several channels with each channel at its own fre2uency. Each channel can only transmit one direction. 8<. 5roadcast 1 A transmission to all interface cards on the network. 87. 5router 1 )ill function similar to a bridge for network transport protocols that are not routable, and will function as a router for routable protocols. 9-. 5%$ 1 5inary %ynchronous $ommunication sends bits in frames which are timed se2uences of data. A possible %>A communications architecture, $$"TT 1 "nternational Telegraph and Telephone $onsultative $ommittee. $!#A 1 $ode division multiple access allows transmission of voice and data over a shared part of radio fre2uencies. This is also called spread spectrum. $!3! 1 $ellular !igital 3acket !ata will allow network connections for mobile users using satellites. cellular 1 An <-- #h/ band for mobile phone service. $*A3 1 $hallenge *andshake Authentication 3rotocol is a three way handshake protocol which is considered more secure than 3A3. ;

$"!R 1 $lassless "nter !omain Routing. $lient 1 This computer re2uests resources for its use from a computer that provides the resource 'a server(. $R$ 1 $yclic Redundancy check is a set of trailing data bytes in a message used to determine if an error occurred in a message. $%#A&$! 1 $arrier1sense multiple1access with collision detection for controlling access to the network media. $%= 1 $hannel service unit used to connect to digital leased lines on the line side. !1A#3% 1 !igital A#3% using T!#A to divide the channels into three channels. !A% 1 !ual attachment stations are used by !!" networks for servers and concentrators are attached to both rings. !AT 1 !igital Audio Tape !atagram 1 "3 header and what is called a message or segment. The message or segment is a transport header 'T$3 or =!3( and application data. The term datagram is used to describe the information before "3 fragmentation or after reassembly. !5#% 1 !atabase #anagement %ystems are used to share data on a network. !!E 1 !ynamic data e+change. !!3 1 !atagram !elivery 3rotocol is a routable protocol that provides for data packet transportation. "t operates at the network layer at the same level of the "3 protocol. !!% 1 !igital data service is a leased dedicated digital line. !E$net 1 rom !igital E2uipment $orporation is a suite of protocols which may be used on large networks that integrate mainframe and minicomputer systems !*$3 1 !ynamic *ost $onfiguration 3rotocol is used to assign "3 addresses dynamically to network cards works at the application layer. R $ ,.:,. !irect se2uence modulation 1 The data is broken into parts and transmitted simultaneously on multiple fre2uencies. !L$ 1 !ata Link $ontrol operates at the data link layer and is designed for communications between *ewlett13ackard network printers and "5# mainframe computers on a !E$net network. !>A 1 !igital >etwork Architecture is a term from !E$>et !>% 1 !omain >ame %ystem is used on the internet to correlate between "3 address and readable names. R $ ,-9:, ,-9., ,.9.1,.9C, ,.7,. !R!A 1 !istributed Relational !atabase Architecture is from "5#. !%= 1 !igital service unit used to connect to digital leased lines on the LA> side. !T! 1 !ocument Type !efinition. !=> 1 !ial up networking. !D# 1 !igital volt meter. E43 1 E+terior 4ateway 3rotocol. =sed between routers of different systems. E"A 1 Electronic "ndustries Association . E"4R3 1 Enhanced "nterior 4ateway Routing 3rotocol integrates the bese capabilities of link1state protocols with distance vector protocols capabilities. E"%A 1 E+tended "%A used when the <-8<; through <-:<; series microprocessors were being produced. "t is backward compatible with "%A. E#" 1 Electromagnetic "nterference. Ethernet 1 A network architecture that uses carrier1sense multiple1access with collision detection '$%#A&$!( for controlling access to the network media and baseband broadcasts. "t uses star topology. !!" 1 iber !istributed !ata "nterface is a network architecture normally used to send longer distances. Topology is ring with two counter rotating rings for reliability with no hubs. $able type is fiber1optic. !#A 1 re2uency !ivision #ultiple Access divides the cellular network into 9-Gh/ channels. rame 1 The unit of transmission in a link layer protocol, consisting of a link1layer header 'ethernet( followed by a packet '"3 header and data(. "t may be a part of a fragmented datagram. rame Relay 1 Error checking is handled by devices at both sides of the connection. rame relay uses frames of varying length and it operates at the data link layer of the ?%" model. A permanent virtual circuit '3D$( is established between two points on the network. rame relay speed is between .;Gbps and ,..::#bps. re2uency hopping 1 The transmitter and receiver change predetermined fre2uencies at the same time 'in a synchroni/ed manner(. T3 1 ile Transport 3rotocol is a T$3&"3 protocol running at the application layer. C

4ateway 1 A gateway can translate information between different network data formats or network architectures. "t can translate T$3&"3 to AppleTalk so computers supporting T$3&"3 can communicate with Apple brand computers. >ot the same as a default gateway used by a client to send packets to. 4%# 1 4lobal %ystem for #obile $ommunications. *!#L 1 *andheld !evice #arkup Language is a version of *T#L only allowing te+t to be displayed. *T#L 1 *yperte+t #arkup Language is the format many files for web viewing are in. "t is a language with Amark1upA te+t included for formatting. *TT3 1 *yperte+t Transfer 3rotocol is the protocol used to communicate between web servers and web browser software clients. *ub 1 A type of repeater used on several network architectures which usually connects several stations. "A5 1 "nternet Architecture 5oard "A>A 1 "nternet Assigned >umbers Authority. "$#3 1 "nternet $ontrol #essage 3rotocol is used to perform network error reporting and status. "t works at the transport layer. R $ C78. "!$ 1 "nternet !atabase collector. "ET 1 "nternet Engineering Task orce. %ets "nternet technical standards. "4#3 1 "nternet 4roup #anagement 3rotocol, used for managing multicast groups. R $ ,,,8. "#A3: 1 "nternet #ail Access 3rotocol version : is the replacement for 3?39 "mpedance 1 The amount of resistance to the transmission device. "nfared 1 "nfared is Eust below the visible range of light between ,--4h/ and ,---Th/. "nterference 1 Electromagnetic "nterference 'E#"(. $rosstalk 1 )hen wires pick up electromagnetic signals from nearby wires also carrying signals. "nternetwork 1 %everal subnets connected together using routers. "nter>"$ 1 "nternet >etwork "nformation $enter, the authority for allocating internet addresses. "ntranet 1 Refers to using internet technologies such as a web server on an internal network. "3 1 "nternet 3rotocol os used for software addressing of computers and works at the data link layer. R $ C7,. "3"3 tunneling 1 Tunneling "3 packets in "3 packets. =sed for D3> tunneling. "3%ec 1 "nternet protocol security, developed by "ET , implemented at layer 9. it is a collection of security measures that address data privacy, integrity, authentication, and key management, in addition to tunneling. =sed for D3>. "36 1 "nternetwork 3acket E+change supports the transport and network layers of the ?%" network model. 3rovides for network addressing and routing. "t provides fast, unreliable, communication with network nodes using a connection less datagram service. "RH1 "nterrupt Re2uest "RT 1 "nternet Research Task force. "%A 1 "ndustry %tandard Architecture internal computer bus. =sed when the original <-<< <bit microprocessor based personal computers were produced. ',; bit(. "%AG#3&?akley 1 "nternet %ecurity Association and Gey #anagement 3rotocol Authentication. "%A3" 1 "nternet %erver Application 3rogramming "nterface "%!> 1 "ntegrated %ervices !igital >etwork is a method of sending voice and data information on a digital phone line. Two ;:Gbps 51channels with one ,;Gbps ! channel is provided with basic "%!> service "%3 1 "nternet %ervice 3rovider "%?$ 1 "nternet %ociety, promotes internet policies. "T= 1 "nternational Telecommunication =nion. T3 1 ile Transfer 3rotocol. L8 1 Layer8 orwarding, works at the link layer of the ?%" model. "t has no encryption. 5eing replaced by L8T3. "t is used for D3>. L8T3 1 Layer 8 tunneling protocol 'R $ 8;;,(. =sed for D3> tunneling. LA> 1 Local Area >etwork L!A 1 Local delivery agent on the receiving machine receives the mail from its #TA. This program is usually procmail. L$3 1 Link $ontrol 3rotocol Link 1 $onnects two network devices. "mplemented by the data link layer. <

LL$ 1 LocIgical link control is the interface between the lower and upper layer networking protocols. L= 1 Logical =nits are ports that users use to access network resources is an %>A term. #A$ 1 #edia Access $ontrol address. 5asically a network card uni2ue hardware address. #ail notifier 1 This program notifies the recipient that they have mail. >ormally this re2uires two programs, biff and comsat. 5iff allows the administrator or user to turn on comsat service. #A>1 #etropolitan area network refers to a network which connects several LA>% over various media that is large enough to cover an area the si/e of a city. #A3" 1 #icrosoft@s #essaging A3" which is incorporated throughout #icrosoft@s office products supports mail at the application level. #A= 1 #ultistation access unit used by Token Ring >etworks. #5?>E 1 5eing on the #5?>E means you are on a network that supports multicasting. #$" 1 #icrochannel architecture by "5# and used mainly on "5# brand computers for the internal bus. Established in ,7<<. ',; or 98 bits(. #!5% 1 #obile !ata 5ase %tation reviews all cellular channels at cellular sites. #edia 1 The hardware method used to connect computers over a network. The three main types are copper cable, fiber optic cable, and wireless. #essage 1 The unit of transmission in a transport layer protocol. A T$3 segment is a message which consists of a transport protocol header followed by application data. #*% 1 #essage *andling %ervice by >ovell is used for mail on >etware networks. #"5 1 #anagement "nformation 5A%E specifies variables the network elements maintain. )orks with the T$3&"3 protocol %>#3. #"#E 1 #ultipurpose "nternet #ail E+tension is the protocol that defines the way files are attached to %#T3 messages. #?T"% 1 #essage1oriented te+t interchange system. #% 1 #essage %tore is a storage area for messages that can@t be delivered immediately when the recipient is off1line. #TA 1 #essage transfer agent is used to pass mail from the sending machine to the receiving machine. There is a #TA program running on both the sending and receiving machine. %endmail is a #TA. #T3 1 #ulticast Transport 3rotocol is a new transport layer protocol designed for reliable multicast network message transport. #T= 1 #a+imum Transmission =nit is the ma+imum si/e of each data packet for the ethernet protocol. #=A 1 #ail users agent. This is the program a user will use to type e1mail. "t usually incorporates an editor for support. The user types the mail and it is passed to the sending #TA. This may also be called the user agent '=A(. #ulticasting 1 Transmitting to a group of interface cards on the network. #ultihomed 1 A host with multiple "3 addresses. >A!> 1 >earest Active !ownstream >eighbor is a Token ring Architecture term. >A= 1 >etwork Addressable =nits is an %>A term. >A=> 1 >earest Active =pstream >eighbor is a Token ring Architecture term. >AT 1 >etwork Address Translation. >5 1 >et5"?% rame 3rotocol. >5>% 1 >et5"?% >ame %erver. A server that maps >et5"?% names to "3 addresses. This service is provided by the nmbd daemon on Linu+. >53 1 >ame1binding protocol of the AppleTalk suite of protocols translates addresses into names. >5T 1 >et5"?% over T$3&"3 defined by R $ ,--8. >$3 1 >et)are $ore 3rotocol provides for client&server interactions such as file and print sharing. "t works at the application, presentation, and session levels. >$3 1 >etwork $ontrol 3rogram performs routing, session management tasks. "t runs in the communications controller. "t is an %>A networking term. >!"% 1 >etwork !river "nterface %pecification from #icrosoft, is used on #icrosoft networks. "t allows multiple protocols to be used on a network card and supports the data link layer of the network model. >et5E=" 1 >et5"?% E+tended =ser "nterface works at the transport layer and provides data transportation. "t is not a routable transport protocol which is why >5T e+ists on large networks to use routable T$3 protocol on large networks. >et5"?% 1 >etwork 5asic "nput ?utput %ystem by #icrosoft. >et!!E 1 >etwork dynamic data e+change. 7

>etwork ?perating %ystem 1 Typically used to run computers that act as servers, but may be used on various types of computers today. > % 1 >etwork ile %ystem. A protocol that allows =>"6 and Linu+ systems remotely mount each other@s file systems. R $ ,-7: >"$ 1 >etwork interface card. Also called LA> adapters. >>T3 1 >etwork >ews Transport 3rotocol is used to link newsgroups for discussions on the web ?$ 1 ?ptical $arrier level, see %?>ET. ?!5$ 1 ?pen !atabase $onnectivity '?!5$( from #icrosoft lets application developers integrate database connections in applications. "t is an application programming interface 'A3"(. ?!5$ drivers convert an application@s 2uery int %HL and send it to the database engine program. ?!" 1 ?pen !ata1link "nterface operates at the data link layer allowing "36 to work with any network interface card. ?%" 1 ?pen %ystems "nterconnect is a suite of protocols developed by the "nternational %tandards ?rgani/ation '"%?( which corresponds with the layers of the ?%" model. ?%3 1 ?pen %hortest 3ath irst, a dynamic routing protocol. R $ ,8:C. 3acket 1 "ncludes an "3 header and data. "t may be a complete "3 datagram or a fragment of an "3 datagram. 3$" 1 3eripheral $omponent "nterconnect internal computer bus. The popular e+pansion bus of choice. "t is significantly faster than E"%A. This is a 98bit bus with plug and play capability from "ntel. 3!$ 1 3rimary !omain $ontroller is an >T server providing central control of user access permissions and accounts on a network. 3A3 1 3assword Authentification 3rotocol is a two way handshake protocol designed for use with 333. 3A3 1 3rinter access protocol of the AppleTalk suite of protocols manages information between workstations and printers. 3$% 1 3ersonal communications %ervice is a ,.7 4h/ band for mobile phones. 3eer 1 A computer that can act as both a client and a server. 3lenum 1 %pace above a false ceiling in an office area where heat ducts and cables may be run. 3lenum cabling is special fire resistant cabling re2uired for use in these areas due to fire ha/ards. 3?3 1 3oint of presence is each point at the end of the transport media 'internet( when talking about D3>. 3?39 1 3ost ?ffice 3rotocol version 9 is used by clients to access an internet mail server to get mail. "t is not a transport layer protocol. 3rotocol 1 A set of standards sets of standards that define all operations within a network. There are various protocols that operate at various levels of the ?%" network model such as transport protocols include T$3, %36. 333 1 3oint to 3oint 3rotocol, used for serial connections to a network ot the internet. 'R $ ,998, ,.:<( 33T3 1 3oint to point tunneling protocol 'R $ 8;9C( =sed for D3> tunneling. 3= 1 3hysical =nits are a network device used to communicate with hosts. "t is an %>A term. RA!"=% 1 Remote Authentication !ial1"n =ser %ervice is used for dial in clients to connect to other computers or a network. "t provides authentication and accounting when using 33T3 or L8T3 tunneling. RA"! 1 Redundant Array of "ne+pensive disks is a fault tolerant method of storing data, meaning that a failure can occur and the system will still function. RAR3 1Reverse Address Resolution 3rotocol used for diskless computers to determine their "3 address using the network. "t works at the data link layer. R $ 7-9. RA% 1 Remote Access %ervice 'RA%( with )indows >T allows users connecting to the network using a modem to use network resources. The >T RA% server can handle 8.; connections. Redirector 1 it runs on a windows operating system and directs re2uests for network resources to the appropriate server and makes network resources seem to be local resources. Repeater 1 =sed on a network to regenerate signals to be sent over long distances or tie computers together on a network. Resolver 1 =sed as part of !>%, it is the client side asking for !>% information. R"3 1 Routing "nformation 3rotocol, a dynamic routing protocol. A distance1vector algorithm is used to calculate the best route for a packet. R $ ,-.<, ,9<< 'R"38(. ,-

Rlogin 1 Remote login between =>"6 hosts. This is outdated and is replaced by Telnet. Router 1 Routes data packets between two networks. "t reads the information in each packet to tell where it is going. R3$ 1 Remote 3rocedure $all. A protocol invented by %un #icrosystem to allow remote computers to invoke functions on other hosts. R $ ,-.C. RR 1 Resource Records are a part of the !>% database. RT#3 1 Routing table maintenance protocol is used to update routers with information about network status and address tables. The whole address table is sent across the network. %&Gey 1 A one time password system, secure against replays. R $ 88<7. %A3 1 %ervice Advertising 3rotocol packets are used by file and print servers to periodically advertise the address of the server and the services available. "t works at the application, presentation, and session levels. %A% 1 %ingle Attachment stations attached to one ring and used by !!" networks to attach workstations to concentrators. %!* 1 %ynchronous !igital *ierarchy %!L% 1 %ynchronous !ata Link $ontrol is a possible %>A communications architecture. %ector %paring 1 A method of fault tolerance that automatically identifies and marks bad sectors as not available. "t is also called hot1fi+ing. %egment 1 The unit of end1to1end transmission in the T$3 protocol which consists of a T$3 header followed by application data. %erver 1 or the most part it provides resources on the network for other computers to use. %4#L 1 %tandardi/ed 4eneral #arkup Language is the base language for document publishing and is used to define 6#L, *T#L and more. %hielding 1 =sed to minimi/e interference. %LE! 1 %ingle Large "ne+pensive disk 1 The concept that a large disk costs less per amount of storage than several smaller ones. %omehow this concept is used as a means of fault tolerance. %L"3 1 %erial Line interface 3rotocol used to connect serially to a network or internet. R $ ,-.., ,,:: '$ompressed(. Replaced by 333. %#A= 1 %mart #ultistation Access =nit. %#5 1 %erver #essage 5lock protocol works at the presentation level to provide peer to peer communication. %#!% 1 %witched #ulti1megabit !ata %ervice uses fi+ed length cell switching and runs at speeds of ,..99 to :.#bps. %#% 1 %#% 1 %ystems #anagement %erver from #icrosoft can collect information of software on each computer and can install and configure new software on the client computers. "t will also monitor network traffic. %#T3 1 %imple #ail Transfer 3rotocol is a T$3 protocol for mail transport running at the application layer. R $ <8,, <88. %>A 1 %ystem >etwork Architecture by "5# is a suite of protocols mainly used with "5# mainframe and A%&:-- computers. %>#3 1 %imple >etwork #anagement 3rotocol. R $ ,,.., ,,.C, ,8,9, ,::,. %?>ET 1 %ynchronous ?ptical >etwork is a physical layer standard that defines voice, data, and video delivery methods over fiber optic media. "t defines data rates in terms of optical carrier '?$( levels. %pread spectrum 1 "t uses several fre2uencies at the same time. %36 1 %e2uenced 3acket E+change operates at the transport layer providing connection oriented communication on top of "36. %HL 1 %tructured Huery Language is a database access language. "t is used by most client&server database applications. %%$3 1 %ystems %ervices $ontrol 3oint manages all resources in the host@s domain. An %>A term. %T3 1 %hielded Twisted 3air cable. ,-- meter ma+imum length. ,;1,.. #bps speed. Lower electrical interference than =T3 %ubnet 1 A part of a network. A class 5 network may have several class $ subnets. =sually routers are used to connect subnets. TA$A$% 1 ?ffers authentication, accounting, and authori/ation. T $arrier 1 #ultiple+ors are used to allow several channels on one line. The T, line is basic T $arrier service. T$3 1 Transport $ontrol protocol is a connection oriented reliable protocol working at the transport layer. R $ C79. ,,

T!" 1 Transport !river "nterface is a standard for passing messages between the drivers at the data link layer and the protocols working at the network layer such as "3 or >et5E=". "t was produced by #icrosoft. T!#A 1 Time !ivision #ultiple Access uses time division multiple+ing to divide each cellular channel into three sub channels to service three users at a time. T!R 1 Time1domain reflectometer sends a sonar like electrical pulse down a cable and can determine the location of a break in the cable. T T3 1 Trivial ile Transfer 3rotocol. R $ ,9.-. Telnet 1 Remote session at the application layer. R $ <.:. Thicknet 1 *alf inch rigid cable. #a+imum cable length is .-- meters. Transmission speed is ,-#bps. E+pensive and is not commonly used. 'R41,, or R41<(. Thinnet 1 Thinnet uses a 5ritish >aval $onnector '5>$( on each end. Thinnet is part of the R41.< family of cableJ. #a+imum cable length is ,<. meters. Transmission speed is ,-#bps. T"A 1 Telecommunications "ndustries Association . TL! 1 Top Level domain Token Ring 1 A network architecture developed by "5# which sends tokens around a ring of computers to allow media access. %tandardi/ed to "EEE <-8.. Topology 1 The shape of the physical connection of a network with regard to repeaters and networked computers. The three main types are ring, bus, and star. =A 1 =sers agent. This is the program a user will use to type e1mail. "t usually incorporates an editor for support. The user types the mail and it is passed to the sending #TA. This may also be called the mail user agent '#=A(. =!3 1 =ser !atagram 3rotocol is a connection less unreliable protocol working at the transport layer. R $ C;<. =>$ 1 =niversal >aming $onvention is used to allow the use of shared resources without mapping a drive to them. =nicast 1 A transmission to a single interface card. =RL 1 =niversal Resource Relocator is a term used to describe the name of a web based resource such as a web page or location of a file for down loading. =T3 1 =nshielded Twisted 3air cable. >ormally =T3 contains < wires or : pair. ,-meter ma+imum length. :1,-- #bps speed. D"# 1 Dendor1"ndependent #essaging protocol from Lotus supports mail at the application level and is supported by many vendors e+clusive of #icrosoft. D3> 1 Dirtual 3rivate >etworking. The function of D3> is to allow two computers or networks to talk to each other over a transport media that is not secure, but the network is made secure by D3> security protocols. )9$ 1 )orld )ide )eb $onsortium, sets standards for the web working with the "ET . )A> 1 )ide Area >etwork is larger than a #A> and may be an enterprise network or a global network. )">% 1 )indows "nternet >ame %ervice is the #icrosoft implementation of >et5"?% name service. wireless bridge 1 #icrowave or infared is used between two line of site points where it is difficult to run wire. )#L 1 )ireless markup language is another name for *!#L. 6.8. 1 This is a set of protocols developed by the $$"TT&"T= which specifies how to connect computer devices over a internetwork. 6.:-- 1 "nternational Telecommunication =nion standard defines transfer protocols for sending mail between mail servers. 6..-- 1 This is a recommendation outlining how an organi/ation can share obEects and names on a large network. "t is hierarchical similar to !>%, defining domains consisting of organi/ations, divisions, departments, and workgroups. 6#L 1 E+tensible #arkup Language is a subset of %4#L and is used widely on the web. K"3 1 Kone information protocol used with RT#3 to map /ones. Routers use /one information tables 'K"Ts( to define network addresses and /one names.

,8

Das könnte Ihnen auch gefallen