11.01.2013 Views

Workshop

Workshop

Workshop

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

providers.<br />

Point-to-Point Tunneling Protocol (PPTP)<br />

A Microsoft-developed specialized form of PPP. PPTP’s unique design makes it possible to<br />

encapsulate or “wrap” non-TCP/IP protocols within PPP. Through this method, PPTP allows two<br />

or more LANs to connect using the Internet as a conduit.<br />

Post Office Protocol (POP3)<br />

A protocol that allows workstations to download and upload Internet electronic mail from<br />

centralized servers. (See RFC 937 for more information.)<br />

PPP Authentication Protocols<br />

A set of protocols that can be used to enhance the security of the Point-to-Point Protocol. (Refer to<br />

RFC 1334.)<br />

PPP DES<br />

The PPP DES Encryption Protocol, which applies the data encryption standard protection to pointto-point<br />

links. This is one method to harden PPP traffic against sniffing. (To learn more, refer to<br />

RFC 1969.)<br />

PPP<br />

See Point-to-Point Protocol.<br />

PPTP<br />

See Point-to-Point Tunneling Protocol.<br />

presentation layer<br />

Layer 6 of the OSI reference model. This layer manages the protocols of the operating system,<br />

formatting data for display, encryption, and translation of characters.<br />

protocol<br />

A standardized set of rules that govern communication or the way that data is transmitted.<br />

protocol analyzer<br />

See network analyzer.<br />

protocol stack<br />

A hierarchy of protocols used in data transport, usually arranged in a collection called a suite<br />

(such as the TCP/IP suite). The actual programs used to implement a protocol stack are<br />

colloquially called a “stack” as well (for example, the Microsoft TCP/IP stack.)<br />

proxy server<br />

A server that makes application requests on the behalf of a client and relays results back to the<br />

client. Often used for a simple firewall; routing domains are typically different. See also<br />

application gateway.<br />

pulse code modulation (PCM)<br />

A system of transforming signals from analog to digital. (Many high-speed Internet connections<br />

from the telephone company use PCM.)<br />

RARP<br />

See Reverse Address Resolution Protocol.<br />

read access<br />

When a user has read access, he or she has privileges to read a particular file.<br />

redundant array of inexpensive disks (RAID)<br />

A large number of hard drives connected together that act as one drive. The data is spread out

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!