Difference between revisions of "ITGS Networking Key Terms"

From WLCS
(Created page with "* Client, host, server * Mainframe, supercomputers * Grid computing, distributed processing * Ethernet, peer-to-peer (P2P) * Local area network (LAN), wide area network (WAN), vi...")
 
 
(One intermediate revision by the same user not shown)
Line 8: Line 8:
 
* Connection types: optical fibre, cable, wireless technologies such as wireless fidelity (WiFi), worldwide interoperability for microwave access (WiMax), Bluetooth, microwave
 
* Connection types: optical fibre, cable, wireless technologies such as wireless fidelity (WiFi), worldwide interoperability for microwave access (WiMax), Bluetooth, microwave
 
* Cloud computing
 
* Cloud computing
* Storage technologies: for example, SAN (storage area network), RAID (redundant array of inexpensive  
+
* Storage technologies: for example, SAN (storage area network), RAID (redundant array of inexpensive disks)
disks)
 
* Network functionality
 
 
* Protocols
 
* Protocols
 
* Synchronous, asynchronous
 
* Synchronous, asynchronous

Latest revision as of 09:20, 26 September 2012

  • Client, host, server
  • Mainframe, supercomputers
  • Grid computing, distributed processing
  • Ethernet, peer-to-peer (P2P)
  • Local area network (LAN), wide area network (WAN), virtual LAN (VLAN), wireless LAN (WLAN), home network
  • Internet, intranet, extranet, virtual private network (VPN)
  • Routers, switches, hubs
  • Connection types: optical fibre, cable, wireless technologies such as wireless fidelity (WiFi), worldwide interoperability for microwave access (WiMax), Bluetooth, microwave
  • Cloud computing
  • Storage technologies: for example, SAN (storage area network), RAID (redundant array of inexpensive disks)
  • Protocols
  • Synchronous, asynchronous
  • Remote access
  • Bandwidth, broadband
  • Bit rates
  • Electronic security: for example, authorized access, levels of access, biometrics, login, password,
  • firewalls, proxy server, encryption, secure socket layer (SSL), audit trails
  • Licences: single-user, multi-user, concurrent, network, site
  • Physical security: for example, locks
  • Monitoring: for example, keystroke monitoring, system performance, surveillance
  • Network policies: for example, backup, archiving, disaster recovery, usage, redundancy, failover
  • Codes of ethics and professional conduct: for example, ACM (Association for Computing Machinery)
  • Data centres
  • Energy usage, uninterruptable power supply (UPS)