
A
CCESS
G
ATEWAY
Glossary of Terms
279
Term
Definition
routes between hosts. To establish path redundancy, STP creates a tree that spans all of
the switches in an extended network, forcing redundant paths into a standby (or
blocked) state. STP allows only one active path at a time between any two network
devices (this prevents the loops) but establishes the redundant links as a backup if the
initial link should fail. If STP costs change, or if one network segment in the STP
becomes unreachable, the spanning tree algorithm reconfigures the spanning tree
topology and reestablishes the link by activating the standby path. Without spanning
tree in place, it is possible that both connections may be simultaneously “live,” which
could result in an endless loop of traffic on the LAN.
Subnet
A portion of a network, which may be a physically independent network segment, which
shares a network address with other portions of the network and is distinguished by a
unique subnet address. In general, a subnet is to a network what a network is to the
Internet.
Subnet Address
The subnet portion of an IP address that is dedicated to the subnet. In a subnetted
network, the host portion of an IP address is split into a subnet portion and a host
portion using an address (subnet) mask. See also, IP Address and Subnet.
Subnet Mask
See Subnet Address.
Subscriber
Any person or organization that pays a period fee for services.
SYSLOG
(SYStem LOGging) Syslog is the standard event logging subsystem for Unix and consists
of a server daemon, a client function library, and a client command line utility. You can
log to files, terminal devices, logged on users, or even forward to other syslog systems.
See also, Daemon.
TCP
(Transmission Control Protocol) Manages data into small packets and ensures that the
data is transmitted correctly over a network. If an error is detected, the data is
transmitted again in its original form. See also, TCP/IP.
TCP/IP
(Transmission Control Protocol/Internet Protocol). A suite of protocols that regulates
data communications for the Internet. See also, Internet Protocol, Protocol, and TCP.
Telnet
A software program and command utility used to connect between remote locations
and services. Telnet connects you to the login prompt of another host (that you have
access rights to). See also, Host.
Throughput
The net data transfer rate between an information source and its destination, using the
maximum packet size without loss. Throughput is expressed as Megabits per second
(Mbps), defined by RFC1242, Section 3.17. See also, Forwarding Rate, Mbps, Packet,
Packet Switching Network, pps, and RFC.
TLS
(Transport Layer Security) A protocol that guarantees privacy and data integrity
between client/server applications communicating over the Internet. The TLS protocol is
made up of two layers:
TLS Record Protocol
Layered on top of a reliable transport protocol, such as TCP, it ensures that the
connection is private by using symmetric data encryption and ensures that the
connection is reliable. The TLS Record Protocol also is used for encapsulation of higher-
level protocols, such as the TLS Handshake Protocol.
TLS Handshake Protocol
Allows authentication between the server and client and the negotiation of an
encryption algorithm and cryptographic keys before the application protocol transmits
Summary of Contents for AG 2300
Page 1: ......