Syngress - Eleventh Hour Network+ Exam N10-004 Study Guide (11 ...
Syngress - Eleventh Hour Network+ Exam N10-004 Study Guide (11 ...
Syngress - Eleventh Hour Network+ Exam N10-004 Study Guide (11 ...
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
180 Glossary<br />
Media Converter A device used when you have two types of dissimilar media<br />
that need to be converged.<br />
Multifunction Devices A device (for example, a network printer or server) that<br />
has the capability to do more than just a single function.<br />
Multiport Bridge It is another name for a switch. Switches can perform the same<br />
functions as a bridge, which can connect two (local area networks) LANs<br />
together or segment a large one into two smaller ones.<br />
Multilayer Switch A switch that uses a combination of switching and routing.<br />
A multilayer switch (also called a Layer 3 switch) works by utilizing switching<br />
tables and switching algorithms to determine how to send data through MAC<br />
addressing from host-to-host or device-to-device.<br />
Network Device Interface Specification (NDIS) The layer of Microsoft’s Windows<br />
model that maps to the data link layer of the OSI model and the network<br />
interface layer of the Defense Advanced Research Projects Agency (DARPA)<br />
model.<br />
Network Attached Storage (NAS) Devices that are dedicated to providing storage<br />
of data on the network. NAS uses hard disks for storage, but instead of<br />
being installed on a server, the storage device is accessed through its own<br />
network address.<br />
Network Adapter A device that allows computers to transmit and receive data<br />
across the network.<br />
Network Interface Card (NIC) A device that allows computers to transmit and<br />
receive data across the network. A NIC can also be referred to as a network<br />
adapter card or network card.<br />
Network A system that interconnects computers and other devices and provides<br />
a method of communication and the ability to share data.<br />
Network Hijacking Usage of a legitimate IP address or MAC address by an unauthorized<br />
device, oftentimes, resulting in the redirection of legitimate data<br />
packets to the unauthorized device. This is also called spoofing.<br />
Network Model Determines the levels of security that are available to the<br />
network and the components needed to connect the computers together.<br />
Network Monitor A tool that monitors traffic on the network and displays the<br />
packets that have been transmitted across the network.<br />
Network Operating Systems (NOS) Softwares such as Windows, NetWare, or<br />
Linux that may be used for a server, which is a computer that provides services<br />
to numerous computers, and/or installed on computers that are used<br />
by individual users of the network.<br />
Network Type Defines the size of the network and its scale within a geographical<br />
area.<br />
Open Systems Interconnection (OSI) Model A seven-layered framework used<br />
as the model for distributed communications that was formed by the<br />
International Organization for Standardization in 1977.