11.01.2013 Views

Workshop

Workshop

Workshop

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

lazing speeds.)<br />

call back<br />

Call-back systems ensure that a trusted host initiated the current connection. The host connects, a<br />

brief exchange is had, and the connection is cut. Then the server calls back the requesting host.<br />

Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)<br />

A traffic-management technique used by Ethernet. In CSMA/CA, workstations announce to the<br />

network that they’re about to transmit data.<br />

Carrier Sense Multiple Access with Collision Detection (CSMA/CD)<br />

A traffic-management technique used by Ethernet. In CSMA/CD, workstations check the wire for<br />

traffic before transmitting data.<br />

Cast-128<br />

An encryption algorithm that uses large keys and can be incorporated into cryptographic<br />

applications. (You can learn more about Cast-128 by reading RFC 2144.)<br />

CERT<br />

See Computer Emergency Response Team.<br />

certificate authority<br />

A trusted third-party clearing house that issues security certificates and ensures their authenticity.<br />

Probably the most renowned commercial certificate authority is VeriSign, which issues (among<br />

other things) certificates for Microsoft-compatible ActiveX components. A certificate is used to<br />

verify the identity of a server or a user on the network.<br />

certification<br />

Either the end result of a successful security evaluation of a product or system, or an academic<br />

honor bestowed on those who successfully complete courses in network engineering and support.<br />

Two of the most popular are Novell’s CNE (Certified Novell Engineer) and Microsoft’s MCSE<br />

(Microsoft Certified System Engineer.)<br />

CGI<br />

See common gateway interface.<br />

Challenge Handshake Authentication Protocol (CHAP)<br />

A protocol (often used with PPP) that challenges users to verify their identity. If the challenge is<br />

properly met, the user is authenticated. If not, the user is denied access. Refer to RFC 1344 for<br />

further information.<br />

channel<br />

In networking, a channel is a communications path.<br />

circuit<br />

A connection that conducts electrical currents and, by doing so, transmits data. Also refers to a<br />

TCP or “circuit-oriented” connection.<br />

client<br />

Software designed to interact with a specific server application. For example, WWW browsers<br />

such as Netscape Communicator and Internet Explorer are WWW clients. They are specifically<br />

designed to interact with Web or HTTP servers.<br />

client/server model<br />

A programming model where a single server can distribute data to many clients (the relationship<br />

between a Web server and Web clients or browsers is a good example). Many network

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!