| # | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z ||
||ping (Packet Internet Groper) is a basic Internet utility program that sends a small amount of data (ICMP packet) to test connectivity between network devices. The verb ping refers to using the ping command to test whether a particular IP address exists and can accept requests.
Ping can be used to check latency: a ping response from a remote host contains RTT (round-trip-time) as well, which is a measure of the delay (latency) of packets transfered between you and that network node.
Ping can be used to find the IP address of a domain: if you ping the hostname, you will see the dot address (such as 184.108.40.206) for that domain name.
Ping can be used to identify packet loss: when you ping a host/IP address several times, if the number of packets transmitted and the number of responses received are not equal there is some packet loss present. This might not be a very accurate measurement however, since some routers are configured to give a very low priority to (consecutive) ICMP pings.
||Physical Layer Convergence Protocol
||PoE (Power over Ethernet) is a standard that allows a single ethernet cable to provide both data connection and electric power to network devices such as wireless access points and IP cameras.
There is more than one common technique to transmit power over ethernet. Only two of the total four twisted pairs in a 10Base-T and 100Base-TX Ethernet cable are used for data, so the other twp pairs are free to be used for transmitting low voltage (typically 48V DC) to power network devices.
Even in 1000Base-T Gigabit Ethernet where all 4 pairs can be used for data, power can still be transferred through the use of "phantom power"-power sent over the same wire pairs used for data. This is possible because electricity and data use different frequencies and can travel over the same cable.
The 802.3af PoE standard defines two methods of power transmission. In one method (Alternative A), power and data are sent over the same pair, in the other method (Alternative B), two wire pairs are used to transmit data, and the remaining two pairs are used for power. The fact there are two different PoE schemes isn’t obvious to the casual user because most PoE devices are made to accept power in either format.
||POP (Point of Presence) refers to a unique access point to the Internet.
||POP3 (Post Office Protocol version 3, defined in RFC 1081) is a protocol that allows network nodes to retrieve email from a server via a temporary connection.
POP3 is useful for nodes that are not permanently connected to the network (Internet), such as residential/mobile compuers, that require a Mail (POP) Server to hold their mail until they can retreive it. Sending/transfering email between nodes on the Internet is assumed to be done via some other protocol, such as SMTP.
||Port triggering allows multiple computers behind a NAT-enabled router use applications which would normally require port forwarding of the same port to each PC, without manually forwarding ports. Similar functionality may be provided by devices, which can broadcast a port to all PCs on the network.
When the router sees a connection from a local PC to an outside server, it opens a temporary port forward to that PC from the internet so servers are able to connect back to that PC on that port.
||POTS (Plain Old Telephone Service) is low-bandwidth communication, as opposed to DSL/ISDN.
POTS uses the frequencies from 300 to 3 kHz to carry voice/data and is generally restricted to ~52 Kbps (kilobits/second). Any service sharing a line with POTS must either use frequencies above 3 kHz or convert POTS to digital and interleave with other data signals.
||Powerline (a.k.a. power-line communication, or PLC) is a range of communication technologies that define network communication of data over conductor wires that are also used simultaneously for AC electric power transmission. A wide range of power-line communication technologies are needed for different applications, ranging from home automation to Internet access and home networking.
Powerline in home networking is most widely deployed under the HomePlug Powerline Alliance standard. HomePlug AV is the most current of the HomePlug specifications, and estimated 45 million HomePlug devices are deployed worldwide.
Note that the technology may require that Powerline devices are on the same electrical circuit, and surge protectors/power strips with filtering may absorb the Powerline signal.
||PPPoA (point-to-point protocol over ATM)
A standard very similar to PPPoE (point-to-point protocol over Ethernet), with some minor differences, for example a DSL modem pumping ATM is internal to the computer, rather than being an ethernet cable away. PPPoA allows for MTUs (maximum transmission units) of 1500, as opposed to PPPoE.
||PPPoE ( Point-to-Point Protocol over Ethernet ) is a method for building PPP sessions and encapsulating PPP packets inside Ethernet frames.
PPPoE is used by a number of DSL providers. It requires either routers that have built-in PPPoE support, or PPPoE software to "dial up" and establish the session. Some notable characteristics of a PPPoE connection are that it requires a username/password to connect, and adds an additional 8-byte header to packets, reducing the maximum packet size to 1492 from 1500.
See also: RFC 2516
||PPTP (Point-to-Point Tunneling Protocol - RFC 2637) is an extension to the PPP protocol designed for VPN, that allows for private "tunnels" over the public Internet.
Generally, such tunneling refers to the ability to encapsulate packets of data formatted for one network protocol in packets used by another protocol (usually transfer of TCP/IP data over a non-TCP/IP network).
PPTP uses port 1723/tcp.
||protocol is an agreed-upon format for transmitting data between two devices. The protocol determines the following:
- type of error checking to be used
- data compression method, if any
- how the sending device will indicate that it has finished sending a message
- how the receiving device will indicate that it has received a message
There are a variety of standard protocols with particular advantages and disadvantages; for example, some are simpler than others, some are more reliable, and some are faster. From a user's point of view, the only significant aspect about protocols is that your computer or device must support the right ones if you want to communicate with other computers.
||A proxy server is an intermediate gateway that sits between a client PC and the Internet and provices forwarding/caching service, as well as security, logging and administrative control.
A caching web proxy server saves content (such as Web pages) in its local cache the first time a request is made, and then serves the pages to other local clients from cache, without the need to forward the request to the Internet. Pages are only requested from the Internet if they are not found in cache. The proxy server forwards requests acting as a client, with its own IP address, and then in turn serves the pages to local clients.
Caching proxy servers offer transparent service to clients, they can save bandwidth and improve performance, however they can also cause slowdowns when congested, as well as some problems delivering dynamic and secure content.
||PSTN (Public Switched Telephone Network) refers to the international telephone system based on copper wires carrying analog voice data.
Originally a network of fixed-line analog telephone systems, the PSTN is now almost entirely digital, and includes mobile as well as fixed telephones. Most switches now use digital circuits between exchanges, with analog two-wire circuits still used to connect to most telephones.
The basic digital circuit in the PSTN is a 64 kbit/s channel called Digital Signal 0 (DS0). To carry a typical phone call the audio sound is digitized at an 8 kHz sample rate using 8-bit pulse code modulation (PCM). The call is switched using a signaling protocol (Signaling System 7) between the telephone exchanges under an overall routing strategy.
||PSU (Power Supply Unit) is the component that provides power for a computer to function. The power cord from a standard electrical outlet connects to the PSU, which converts the AC current to DC and regulates voltages that the separate devices in the computer need to function. The PSU usually has a wattage rating, which indicates the maximum power output of the PSU under load. Faster computers with more components require more powerful (in terms of watts) power supplies to provide adequate power to all components.
||QAM (Quadrature Amplitude Modulation) is a modulation technique in which there are 16 possible four-bit patterns, determined by the combination of phase and amplitude.
||A cable modem scans the entire frequency spectrum looking for a 6 MHz channel where the MPEG-2 frames are stamped with a PID of 0x1ffe. Once the cable modem finds a 6 MHz channel that carries this type of MPEG-2 frame, it achieves what is called a QAM lock.
||QoS (Quality of Service) is a term that describes the ability of a network to provide a particular level of service availability. QoS levels can range from best-effort to dedicated bandwidth. QoS is a technical term associated with ATM, but is commonly used to describe the concept of guaranteed availability for a wider range of technologies.
||RADIUS (Remote Access Dial-Up User Service) is an authentication standard technology, often used to protect access to wireless networks. RADIUS is a user name and password scheme that enables only approved users to access the network; it does not affect or encrypt data. The first time a user wants access to the network, secure files or internet locations, he or she must input his or her name and password and submit it over the network to the RADIUS server. The server then verifies that the individual has an account and, if so, ensures that the person uses the correct password before she or he can get on the network. RADIUS can be set up to provide different access levels or classes of access.
||RADSL (Rate-Adaptive Asymmetric Digital Subscriber Line) is an ADSL implementation that automatically adjusts the connection speed according to the quality of the telephone line, allowing RADSL to function over longer distances than ordinary ADSL.
||RAID - Redundant Array of Independent (or Inexpensive) Disks. Type of disk storage configuration often used on servers, where several physical disks are combined into an array for better speed and/or fault tolerance.
RAID 0 (data striping) - file blocks are written to separate drives. Does not provide fault tolerance, because failure of one drive will result in data loss.
RAID 1 (data mirroring) - data is duplicated on two drives either through software or hardware. Provides faster read performance than a single drive and good fault tolerance.
RAID 2 (not used in practice) - data is split at bit level at written to multiple drives.
RAID 3 (requires 3+ drives) - data block is striped at byte level across drives and error correction codes (parity info) is recorder on another drive. Provides fault tolerance but slower writing performance.
RAID 4 - similar to Level 3 but provides faster performance because it uses blocks for striping.
RAID 5 - similar to Level 4 but improves performance by also striping parity info across multiple drives.
RAID 6 - similar to Level 5 but also uses second parity scheme for better fault tolerance.
RAID 7 - proprietary RAID design by Storage Computer Corporation. Faster than other levels because it uses multiple levels of cache and asynchronous I/O transfers.
||Ransomware is a type of malicious software that is installed covertly on a victim's computer and prevents users from accessing their system or files. Typically, ransomware spreads through trojans and locks the users' files/system unless a ransom is paid.
More simple variants just lock the system and display a message demanding payment to unlock it. They are somewhat easier to unlock. More advanced variants actually encrypt files, or, in some cases the entire hard drive or the computer's Master File Table (MFT). Such variants are almost impossible to clean, as they render files inaccessible.
||RARP - Reverse Address Resolution Protocol (RFC 903).
RARP is a Link layer networking protocol used by a host computer to obtain its Internet Protocol (IPv4) address when it has available its link-layer address, such as an Ethernet MAC address.
||RC4 is a symetric stream cipher with an arbitrary key size designed by RSA Security, Inc. in 1987. It is essentially a pseudo random number generator, with the output of it being XORed with the data stream to produce encrypted data. The source code for an RC4 algorithm (or a code that produces the same results) was posted on Usenet in 1994. It is fast, it has been extensively analyzed and proven to be secure.
The RS4 cipher is used in SSL (Secure Socket Layer), WEP (Wireless Equivalent Privacy), WPA (Wi-Fi Protected Access), TKIP, MS XBOX, Oracle SQL, Adobe Acrobat, etc.
||RCPI (Received Channel Power Indicator) in 802.11 wireless networking is a measure of the received RF power in a selected channel over the preamble and the entire received frame. Note that a power level metric like RCPI generally can't comment on the quality of the link by itself.
See: IEEE 802.11k-2008
||Regedit is an editor for accessing the Windows registry that is provided with the Windows operating system. It can be accessed from the Start Menu ( START > Run > type "regedit" ). Some of the changes to registry keys/values require rebooting the PC before they take effect.
It is a good idea to star the registry editor as admininstrator (right-click > Run as Administrator), as changes to some of the "hives" require elevation.
Note: Modifying some registry settings can cause serious problems and damage your operating system to a point where it needs to be reinstalled. Make backups and use the information at your own risk.
Again, it is always a good idea to backup the Windows Registry before making changes!
||In telecommunications, a repeater is a device that receives a signal and retransmits it, so that the signal can cover longer distances. A repeater can either retransmit it at a higher level/power, or it can simply extend the range by repeating the signal over some obstacles. If placed at the edge of a network, it can extend the coverage area.
In wireless networking, a wireless repeater (a.k.a wireless range extender) takes an existing signal from a wireless router or access point and rebroadcasts it to/from wireless clients to extend the range of the network. It differs from access points in that it is wirelessly connected to all devices on both ends of the connection.
||RFCs (Requests for Comments) are the official documents of the Internet Engineering Task Force (IETF) and the Internet Society that specify the details for protocols included in the TCP/IP family.
RFCs are authored by computer scientists and engineers in the form documents describing research, methods, and innovations applicable to the working of the Internet and Internet-connected systems. RFCs are submitted either for peer review or simply to convey new concepts and information. The IETF adopts some of the proposals published as RFCs as Internet standards.
IETF has published over 7000 RFCs, all of which can be viewed at IETF.org, or RFC-Editor.
||RFI (Radio Frequency Interference) - signal interference on the radio frequency electromagnetic spectrum (from 3 KHz to 300 GHz).
||RIAA (Recording Industry Association of America) is a special interest trade group formed in 1952, representing the US recording industry.
The RIAA has been at the heart of the P2P file-sharing controversy, as well as any new technology that can be used to record media content (the VCR for example). RIAA is continuously lobbying and waging an aggressive legal campaign attempting to defend the interests of its members (the larger record labels).
||RIR (Regional Internet Registry) is an organization overseeing the allocation and registration of Internet number resources within a particular region of the world. Resources include IP addresses (both IPv4 and IPv6) and autonomous system numbers (for use in BGP routing).
There are currently five RIRs in operation:
American Registry for Internet Numbers (ARIN) for North America and parts of the Caribbean
RIPE Network Coordination Centre (RIPE NCC) for Europe, the Middle East and Central Asia
Asia-Pacific Network Information Centre (APNIC) for Asia and the Pacific region
Latin American and Caribbean Internet Addresses Registry (LACNIC) for Latin America and parts of the Caribbean region
African Network Information Centre (AfriNIC) for Africa
||RJ-11 (Registered Jack 11) - a standard connector that is used to connect to the telephone line, the most common telephone jack.
||RJ-45 (Registered Jack 45) is a standard connector for the ends of a Category 5 network cable. Though it is similar in apperance to a phone plug (RJ-11), it has 8 wires rather than 6, and is slightly wider.
||Rolling On Floor, Laughing
||rootkit is a type of malicious software that is activated each time your system boots up. Rootkits are generally difficult to detect, since they run before the Operating System has completely booted up.
||A router is the central switching device in a packet-switched network that directs and controls (routes) the flow of data.
A traditional router routes packets within a single address realm, while a NAT router directs datagrams between different address realms. A NAT router sits on the border between two adress realms and performs such "transparent routing" by modifying addresses in IP headers, so that when packets enter another address realm they can be valid and routed properly.
Routers are differentiated from data communications switches by the ability to perform higher-level functions necessary to the interconnection of different networks.
||RPC (Remote Procedure Call) is a protocol that a program can use to request a service from a program located on another computer in a network. RPC helps with interoperability because the program using RPC does not have to understand the network protocols that are supporting communication. In RPC, the requesting program is the client and the service-providing program is the server.
Two newer object-oriented methods for programs to communicate with each other, CORBA and DCOM, provide the same types of capabilities as traditional RPCs.
||RSN (Robust Security Network) is a WPA (Wi-Fi Protected Access) replacement built on 802.1x and the AES (Advanced Encryption Standard).
||RSS (Really Simple Syndication) is a popular, lightweight XML format designed for sharing headlines, and other web content between sites. It is most often used for gathering and distributing news and other web content.
RSS (Receive-side Scaling) is also a method allowing for parallelized processing of received network packets on multiple processors, while avoiding packet reordering.
||RSSI (Recieved Signal Strength Indicator) is a common name for the received radio signal power level in a wireless network. It is often measured in either decibels (db), or simply numbers between 0 and 100. RSSI can be expressed as either a negative or positive value, however, in both instances smaller values closer to zero indicate a stronger signal.
Some older chipsets used RSSI from 0 to 256, or 0 to 127. Most newer chipsets use 0 to 100.
In 802.11 wireless, RSSI is being replaced by RCPI (Received Channel Power Indicator).
| # | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z ||