Difference between revisions of "ITGS Networking Key Terms"
From WLCS
(Created page with "* Client, host, server * Mainframe, supercomputers * Grid computing, distributed processing * Ethernet, peer-to-peer (P2P) * Local area network (LAN), wide area network (WAN), vi...") |
|||
(One intermediate revision by the same user not shown) | |||
Line 8: | Line 8: | ||
* Connection types: optical fibre, cable, wireless technologies such as wireless fidelity (WiFi), worldwide interoperability for microwave access (WiMax), Bluetooth, microwave | * Connection types: optical fibre, cable, wireless technologies such as wireless fidelity (WiFi), worldwide interoperability for microwave access (WiMax), Bluetooth, microwave | ||
* Cloud computing | * Cloud computing | ||
− | * Storage technologies: for example, SAN (storage area network), RAID (redundant array of inexpensive | + | * Storage technologies: for example, SAN (storage area network), RAID (redundant array of inexpensive disks) |
− | disks) | ||
− | |||
* Protocols | * Protocols | ||
* Synchronous, asynchronous | * Synchronous, asynchronous |
Latest revision as of 09:20, 26 September 2012
- Client, host, server
- Mainframe, supercomputers
- Grid computing, distributed processing
- Ethernet, peer-to-peer (P2P)
- Local area network (LAN), wide area network (WAN), virtual LAN (VLAN), wireless LAN (WLAN), home network
- Internet, intranet, extranet, virtual private network (VPN)
- Routers, switches, hubs
- Connection types: optical fibre, cable, wireless technologies such as wireless fidelity (WiFi), worldwide interoperability for microwave access (WiMax), Bluetooth, microwave
- Cloud computing
- Storage technologies: for example, SAN (storage area network), RAID (redundant array of inexpensive disks)
- Protocols
- Synchronous, asynchronous
- Remote access
- Bandwidth, broadband
- Bit rates
- Electronic security: for example, authorized access, levels of access, biometrics, login, password,
- firewalls, proxy server, encryption, secure socket layer (SSL), audit trails
- Licences: single-user, multi-user, concurrent, network, site
- Physical security: for example, locks
- Monitoring: for example, keystroke monitoring, system performance, surveillance
- Network policies: for example, backup, archiving, disaster recovery, usage, redundancy, failover
- Codes of ethics and professional conduct: for example, ACM (Association for Computing Machinery)
- Data centres
- Energy usage, uninterruptable power supply (UPS)