| the task for network administrators because the software keeps track |
| of IP addresses ra ther than requiring an administrator to manage the |
| task. This means a new computer can be added to a network without |
| the hassle of manually assigning it a unique IP address. DHCP |
| allows the specification for the service provided by a router, gateway, |
| or other network device that automatically assigns an IP address to |
| any device that requests one |
DNS | Domain Name System is an Internet service that translates domain |
| names in to IP addresses. Since domain names are alphabetic, |
| they're easier to remember. The Internet however, is really based on |
| IP addresses every time you us e a domain name the DNS |
| will translate the name into the corresponding IP address. For |
| example, the domain name www.network_camera.com might |
| translate to 192.167.222.8. |
| E |
Enterprise network | An enterprise network consists of collections of networks connected |
| to each other over a geographically dispersed area. The enterprise |
| network serves the needs of a widely distributed company and |
| operates the company’s |
Ethernet | The most popular LAN communication technology. There are a |
| variety of types of Ethernet, including 10 Mbps (traditional Ethernet), |
| 100 Mbps (Fast Ethernet), and 1,000 Mbps (Gigabit Ethernet). Most |
| Ethernet networks use Category 5 cabling to carry information, in the |
| form of electrical signals, between devices. Ethernet is an |
| implementation of CSMA/CD that operates in a bus or star topology. |
| F |
Fast Ethernet | Fast Ethernet, also called |
| per second over UTP, STP, or |
Firewall | Firewall is considered the first line of defense in protecting private |
| information. For better security, data can be encrypted. A system |
| designed to prevent unauthorized access to or from a private |
| network. Firewalls are frequently used to prevent unauthorized |
| Internet users from acce ssing private networks connected to the |
| Internet, especially Intranets all messages entering or leaving the |
| intranet pass through the firewall, which examines each message |
| and blocks those that do not meet the specified security criteria. |
| G |
Gateway | A gateway links computers that use different data formats together. |
Group | Groups consist of several user machines that have similar |
| characteristics such as being in the same department. |
| H |
HEX | Short for hexadecimal refers to the |
| consists of 16 unique symbols: the numbers 0 to 9 and the letters A |
| to F. For example, the decimal number 15 is represented as F in the |
| hexadecimal numbering system. The hexadecimal system is useful |
| because it can represent every byte (8 bits) as two consecutive |