Technical Glossary from Frontier

Similar documents
The part of the network that connects customers to the exchange, sometimes called the local loop or the last mile.

ADSL or Asymmetric Digital Subscriber Line. Backbone. Bandwidth. Bit. Bits Per Second or bps

Chapter 5. Data Communication And Internet Technology

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

Advanced Higher Computing. Computer Networks. Homework Sheets

Free wifi in the TRA halls and faster mobile access

Networks 2. Gabriela Ochoa University of Stirling CSCU9B1 Essential Skills for the Information Age. Content

ADSL BROADBAND BASICS FOR THE DOMESTIC USER. The Main Limitations of ADSL Broadband are as follows.

CHAPTER 8: NETWORKING AND DIGITAL COMMUNICATION

Technical papers Virtual private networks

Introduction to computer networks and Cloud Computing

RAS Associates, Inc. Systems Development Proposal. Scott Klarman. March 15, 2009

Chapter 15: Advanced Networks

Chapter 2 - The TCP/IP and OSI Networking Models

JARGON BUSTER CONNECTING WALES

Internet Public Network

Glossary of Telco Terms

Telecommunications, Networks, and Wireless Computing

DSL-2600U. User Manual V 1.0

Chapter 4 Connecting to the Internet through an ISP

An automated system designed to guide a caller through the options of a voice menu. Typically set to answer and route incoming calls.

Chapter 4: Networking and the Internet

Broadband Bonding Network Appliance TRUFFLE BBNA6401

TAXONOMY OF TELECOM TERMS

Internet access for home and business. home business internet

3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET

WAN Technology. Heng Sovannarith

E1-E2 (EB) Chapter 8A. Broadband Services

Data Transmission. from one person or place to another. person or place to another of passing something

CTS2134 Introduction to Networking. Module 07: Wide Area Networks

Computer Networks. Computer Networks. Telecommunication Links. Connecting. Connecting via Telephone Lines ISDN

Meeting the challenge of voice services

Broadband Definitions and Acronyms

Getting Broadband. FCC Consumer Facts. What Is Broadband?

The Internet and Its Uses

Key Term Quiz Answers

1.264 Lecture 37. Telecom: Enterprise networks, VPN

Introduction Page 2. Understanding Bandwidth Units Page 3. Internet Bandwidth V/s Download Speed Page 4. Optimum Utilization of Bandwidth Page 8

Best Products. Best Service

Small Business Server Part 2

WAN Data Link Protocols

Chapter 5: Understanding Internetworking Infrastructure

ZyXEL offer more than just a product, we offer a solution. The Prestige DSL router family benefits providers and resellers enabling them to offer:

How To Get High Speed Internet In Australia

Introduction to Broadband

Public Network. 1. Relatively long physical distance 2. Requiring a service provider (carrier) Branch Office. Home. Private Network.

Think! Think! Data communications. Long-Distance. Modems: to analog and back. Transmission Media. The last mile is the hardest for digital information

Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb).

Internet access for home and business. home business internet

General Policy Statement:

General Tariff Information

ISP Checklist. Considerations for communities engaging Internet Services from an Internet Service Provider. June Page 1

WiFi Anywhere. Multi Carrier 3G/4G WiFi Router. IntraTec Solutions Ltd

TCP/IP Network Communication in Physical Access Control

Universal Network Access Policy

COMPUTER NETWORK TECHNOLOGY (300)

BLUE VALLEY TELE-COMMUNICATIONS MASS MARKET INTERNET SERVICE POLICIES AND CUSTOMER INFORMATION

Firewall VPN Router. Quick Installation Guide M73-APO09-380

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?

Multi-Homing Dual WAN Firewall Router

NineStar Connect MASS MARKET INTERNET SERVICE POLICIES AND CUSTOMER INFORMATION. Policy Statement:

Chapter 7: Computer Networks, the Internet, and the World Wide Web. Invitation to Computer Science, C++ Version, Third Edition

Smart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1

Table of Contents. The Welcome Letter Getting Connected Positioning your Linksys Modem Filters Why are they Needed?...

ADSL MODEM. User Manual V1.0

Student Halls Network. Connection Guide

Wireless Links - Wireless communication relies on radio signals or infrared signals for transmitting data.

Using a Sierra Wireless AirLink Raven X or Raven-E with a Cisco Router Application Note

White paper. Reliable and Scalable TETRA networks

Web hosting. Web hosting

Voice and Delivery Data Networks

Troubleshooting Remote Viewing on the. Combo DVR/Monitor System

Internet and Services

WAN Traffic Management with PowerLink Pro100

Understand Wide Area Networks (WANs)

Edgewater Routers User Guide

Introduction. Network Basics. Workstations. Server. Hub

Using the Internet Outcome1

UIP1868P User Interface Guide

Broadband A to Z Glossary

why fixed.plan? We only connect to Tier 1 partners, including Openreach, BT and Talk Talk Business, ensuring a robust and reliable service.

IP Telephony Basics. Part of The Technology Overview Series for Small and Medium Businesses

Web Browsers And Mailing Tools

WISE-4000 Series. WISE IoT Wireless I/O Modules

INTERNET CONNECTIVITY

Using a Firewall General Configuration Guide

How do SMB benefit from using the Small but Secured Aries Server Appliance

MMGD0204 Web Application Technologies. Chapter 1 Introduction to Internet

Chapter 1 Instructor Version

Local Area Networks (LANs) Blueprint (May 2012 Release)

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

Computer Networking Networks

Introduction Chapter 1. Uses of Computer Networks

Edgewater Routers User Guide

ehealth Ontario EMR Connectivity Guidelines

Connection Services. Hakim S. ADICHE, MSc

Home Networking Evaluating Internet Connection Choices for a Small Home PC Network

Broadband Phone Gateway BPG510 Technical Users Guide

Bandwidth Primer The basic conditions and terms used to describe information exchange over networks.

Using over FleetBroadband

Transcription:

Technical Glossary from Frontier

A Analogue Lines: Single Analogue lines are generally usually used for faxes, single phone lines, modems, alarm lines or PDQ machines and are generally not connected to a telephone system. Multi Analogue lines are usually used as back up to ISDN30 lines on telephone systems or as the main lines on older small keytelephone systems or direct lines connected by sockets in a small office. Anti-virus: A software program that protects the internal company computer network from malicious software. Often run in association with a firewall and a spam filter. Application/applet: A software program. Examples include word processing programs, spreadsheets etc. Applets are more basic cut-down versions of applications often used for e-commerce e.g. Internet banking. ATM: Asynchronous Transfer Mode. A networking protocol allowing data to be transmitted rapidly. Most commonly deployed on large corporate networks and international telecommunications links. B Bandwidth: A measure of the data capacity of your connection, or how much information can be squeezed down the line. Measured in bits per second. Bounce: Returned packets of data, see Internet Protocol (IP), are said to have bounced. Email bounce back due to mistyped addresses is common. Bit (kb, Mb, Gb): The smallest unit of information on a computer, and the basis of the logic that underpins all modern day systems. Bits per second (bps): The amount of data transmitted from one device to another per second. Common abbreviations are kbps (Kilobits per second a thousand bits) and Mbps (Megabits per second a million bits). See bits. Bytes (kb, MB, GB): A unit of storage capable of holding a single character, a byte is normally equal to 8 bits. Common divisions are kilobytes (1,024 bytes), megabytes (1,048,576 bytes), and gigabytes (1,073,741,824 bytes). The correct abbreviation for bytes is a capital B. A lowercase b indicates bits. C Co-location: Placing your server, usually a Web server, in a dedicated facility to ensure it stays up and running, and is kept safe and secure. This removes the risk of it being unplugged.

Contention ratio: The number of other organisations sharing your bandwidth. Usually expressed as a ratioe.g. 20:1 means you might have to share your connection with up to 19 others. The bandwidth offered is the maximum available and actual speeds will often be much lower. Cookie: Short files storing personal data and used to create customised web pages. Turning cookies off means you will have to re-enter your details every time you revisit a website. Irritating for a sole user of a password protected PC but an essential security procedure if accessing over a shared terminal or from an Internet cafe. D Data centre: A managed facility containing racks of servers monitored by technical staff. ISPs generally run their own data centres or lease space and staff in one. Essential to provide effective colocation and hosting services. Disaster recovery: A term for technologies and services that ensure the IT functions of a business are interrupted for the shortest time possible in case of events such as fire or flood. At the most basic level this is storing back-up copies of data on tapes or servers at an alternate location. ISPs generally provide a range of services often backing up systems remotely over an Internet connection. DNS: Domain Name Server. The World Wide Web runs on numbers. Domain Name Servers are the equivalent of Directory Enquiries converting these numbers back into names so that they're easier for people humans to remember. Domain name: A name linked to one or more IP addresses. Domain names are used within URLs. For example in www.fvdata.co.uk fvdata.co.uk is the domain name. DSL (ADSL/SDSL): Digital subscriber line the most common type of Broadband connection as it can be run over existing phone lines, rather than over specially laid cable, or wireless connections. The various letters to be found in front of DSL indicate whether the connection is Asymmetric where it s quicker to download than send data, or Symmetric where the upload and download speeds are the same. E E-commerce: A general term for conducting business online. One of the few survivors from a trend in the 1990 s of prefixing the letter 'e' onto common activities. Another survivor is email.

F Failover: A backup system to ensure critical IT systems keep running. Fibre network: A network where data is transmitted as pulses of light over glass fibres. This is a faster alternative to sending electrical signals over copper wires, which have traditionally formed telephone lines. Mainly used for long distance and data rich communications. H Hardware: The physical equipment over which the computing system functions. Normally paired with software, which directs its operations. Host: To provide the infrastructure over which services are run. A common hosting agreement is for ISPs and telecoms companies to host the websites and applications of other firms on their own machines, rather than just provide space for the business server in their rack. This provides benefits including 24 hour monitoring and resilience. Hub: A common connection point for multiple devices on the same network. Passive hubs pass the data from one device to many others, whilst active hubs (often known as switches) are like mini telephone exchanges, connecting the appropriate devices with one another when needed. I Internet Protocol (IP): Internet Protocol allows you to address individual packets of data (discrete chunks of information) and send them via the Internet without a physical connection with the receiving computer. ISDN Lines: Digital Lines. ISDN2 standard: A single ISDN2 circuit that delivers two digital exchange lines and used in data transfer when connected to a PC/Server, ISDN faxes and PDQ Machines, routers and videoconferencing units. ISDN2 system: Delivers at least two digital exchange lines/channels and is available in multiples of two lines, up to a maximum of 30 (ISDN30 is recommended for more than 8). A direct dial number range can work over the circuit and the service is mainly used to connect to ISDN2e compatible phone systems. ISDN30: A single ISDN circuit that delivers a minimum of 8 and up 30 digital exchange lines/channels. Equivalent to a 2Mb circuit, ISDN30 lines are primarily used for voice lines connected to compatible systems.

L LAN: Local Area Network, a network of computers confined to a small area, for example an office. Many LANs can be connected together to form a wide area network (WAN). An example is the corporate network of a high street bank, with each branch having its own LAN and being part of the WAN. The most common protocol to transmit data over a LAN is Ethernet. Latency: The delay between sending the data and it being received. Alongside bandwidth this will define the speed and capacity of your network. Leased line: A permanent telecommunications connection between two points. This might include a local telephone exchange and a business with heavy telecoms traffic. M Malware: Short for malicious software and includes viruses, trojan horses and worms. N NOC: The Network Operations Centre. The physical space from which a telecommunications network is run. P Packet: A discrete chunk of information transmitted over a network, usually incorporating the destination IP address. Ping: A method of determining whether an IP address is open. A small packet of data is sent to an address with the instructions to send a reply straight back. Often used to troubleshoot Internet. POP: Point of presence an access point to the Internet. Typically owned by ISPs the availability of a POP in your area will determine the availability of various telecoms services. Protocol: Set of rules by which various Internet devices communicate between themselves to transmit data e.g. IP and FTP. R Redundancy: Indicates the presence of back-up systems to take over in the event of systems failing. Remote user: Remote refers to anything not connected directly to your computer. Remote users include a laptop user in reception, a sales person on the road and home workers. Technologies such as VPN allow users to be connected into a network.

S Server: The computer on a network which manages all the network resources. Often there are separate servers to manage files, printing, email, network traffic and databases. T Transfer protocol: The software language of the Internet. The main two are File Transfer Protocol (FTP) for moving entire files and Hyper Text Transfer Protocol (HTTP) for download only. Hyper Text Markup Language (HTML) covers how web pages are displayed. U URL: Uniform Resource Locator. The address in a browser e.g. http://www.fvdata.co.uk. V VoIP: Voice over IP. A term applied to both the hardware and software that allows phone calls over the Internet or using IP protocols. The advantages include cheaper calls and the ability to integrate calls with computing applications. VPN: Virtual Private Network. A secure and encrypted method of connecting computers securely over the Internet or shared networks. W WLAN: Wireless LANs are becoming popular. These dispense with wires and instead communicate via radio waves. WiFi: Any product certified by the Wireless Fidelity Alliance - a guarantee that different pieces of wireless LAN kit work together. X XML: extensible Mark-up Language - a method for sharing data across different computer systems and applications. Digital devices in the future should be able to create and view XML files allowing data to be swapped.