servers and wireless

Upload: graham-l-penner

Post on 05-Apr-2018

219 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/2/2019 Servers and Wireless

    1/26

    SERVERS & Security

    Apache - One of the world's most popular Web server programs, Apache was built

    by a group of open-source programmers and is often used because of itsoutstanding performance, strong security features and the fact that it is free.

    Application Infrastructure - The software components that your custom applicationrelies on for its functionality. Examples include web servers, application serversand database servers.

    ARP(Address Resolution Protocol) is the protocol used to dynamically mapinternet addresses to a physical hardware device.

    Authentication - Authentication is a process where a person or a computerprogram proves their identity in order to access information. The persons identityis a simple assertion, the login ID for a particular computer application, forexample. Proof is the most important part of the concept and that proof isgenerally something known, like a password; something possessed, like your ATMcard; or something unique about your appearance or person, like a fingerprint.Strong authentication will require at least two of these proofs. State of the artauthentication processes are tightly linked with encryption or crypto systems. In aworld where the application that wants to authenticate you is on the other side ofan open network like the Internet, the password that is your proof must be sentencrypted or its no longer a secret.Back-end - (1) The part of the computer that changes source code into objectcode (machine read code). (2) The part of the program that runs on a server in aclient/server application.

    Bandwidth - The amount of data that can be transmitted at a given moment to aserver. The higher your bandwidth, the larger amount of traffic your site canhandle at one time.

    Bridge - Connects two different kinds of local networks, such as a wirelessnetwork to a wire Ethernet network.

    CGI - Short for Common Gateway Interface, a small script that processes datataken from the user (such as from a form application).

    Cgi-bin - The directory on a web server where CGI scripts are stored.

  • 8/2/2019 Servers and Wireless

    2/26

    The Cloud - A pool of highly available servers and computing services, madeavailable for general use by web and other network-based applications.

    Cloud Bursting - Using cloud resources as a pressure valve when an increasedamount of computer resources are required for a burst in traffic, or short-term

    demand spikes in activity or load.

    Cloud Computing - The sharing of compute resources (dedicated, time-shared, ordynamically shared servers) and related infrastructure components (loadbalancers, firewalls, network storage, developer tools, monitors and managementtools) to facilitate the deployment and operation of web and network basedapplications. Cloud computing environments provide developers and theircustomers direct on-demand access to large-scale and scalable computingcapabilities, all at a fraction of the cost of dedicated options such as managed datacenters, colocation facilities, or private data centers. Cloud resources are typicallyaccessed via the public Internet.

    DDoS - Short for Distributed Denial of Service Attack, the most common form ofattack on network devices. It overwhelms a network by monopolizing itsbandwidth by flooding it with information from multiple hosts, thereby preventinglegitimate network traffic.

    Default Gateway - The device that forwards Internet traffic to your internalnetwork.

    Device - Refers to the individual hardware components that make up a uniquehosted configuration. This includes servers, firewalls and load balancers.

    DHCP (Dynamic Host Configuration Protocol) A protocol that lets one device on alocal network, known as a DHCP server, assign dynamic IP addresses to the othernetwork devices, typically computers.

    Directory Service - A directory service, in the technical sense, is very much like adirectory service in the real world. A real-world directory service lets you look up atelephone number when you know someones name and location. In the sameway, directory services on computers let you look for other computers, e-mail

    addresses, files and folders, and many other objects and attributes.

    DNS - Domain Name Server (or system) An Internet service that translatesdomain names into IP addresses.

  • 8/2/2019 Servers and Wireless

    3/26

    DSL - Uses copper pair wiring to transfer data. sDSL provides the same transferspeed for uploading or downloading. aDSL provides a faster download speed butslower upload.

    Firewall - A piece of security software or hardware designed to protect web

    servers. They are typically used to protect sites from hacker attacks/unauthorizedaccess.

    Forward DNS Lookup - A Forward DNS Lookup, or just DNS Lookup, is the processof looking up and translating a domain name into its corresponding IP address.This can be compared to a Reverse DNS Lookup, which is the process of lookingup and translating an IP address into a domain name.

    FQDN - Fully Qualified Domain Name A name consisting of both a host and adomain name. For example, www.lsoft.com is a fully qualified domain name. wwwis the host; lsoft is the second-level domain; and .com is the top-level domain.

    FTP - File Transfer Protocol FTP is the language used for file transfer fromcomputer to computer across the Internet. FTP servers can be secure oranonymous. The software used to transfer data via FTP is called an FTP client.

    FTP Client An FTP client is a piece of software which allows you to log in to yourFTP server to upload and edit files.

    Gateway - This is a hardware or software set-up that functions as a translatorbetween two dissimilar protocols. A gateway can also be the term to describe anymechanism providing access to another system (e.g AOL might be called agateway to the Internet).

    Grid Computing - An architecture for server networking, whereby processing cyclesof all computers in a grid network can be allocated to a particular application. Thisdiffers from other architectures in that the integration is accomplished at thehardware level, thereby making the grid appear as a single large resource, ratherthan a pool of shared autonomous resources.

    Host - When a server acts as a host it means that other computers on the networkdo not have to download the software that this server carries.

    Host name - The name of a computer on the Internet (such as www.wilson.ca).

  • 8/2/2019 Servers and Wireless

    4/26

    HTML - Short for HyperText Markup Language, the language by which web serversand client browsers communicate. All server-side functions (such as databaseprocessing), although they may be performed in another language, musteventually be output back to the user in HTML.

    HTTP - Stands for HyperText Transfer Protocol, the protocol by which HTML filesmove across the Internet. HTTP requires a client browser and an HTTP server(typically a web server).

    ICMP(Internet Control Message Protocol) is used to communicate IP status anderror messages between hosts and routers.

    IDS - Short for Intrusion Detection System, it recognizes all types of hostilenetwork traffic and computer usage that can't be detected by a conventionalfirewall.

    IIS - Short for Internet Information Server, Microsoft's server software forWindows NT/2000.

    ISDN - Integrated Services Digital Network accommodates speeds at either 64 or128 Kbps. It works with data, voice and video signals. Internet - The largestworldwide computer network.

    Intranet - Contrary to the public Internet, an intranet is a private network inside acompany or organization.

    IP address - An IP (Internet Protocol) address is a unique identifier for a computeron the Internet. It is written as four numbers separated by periods. Each numbercan range from 0 to 255. Before connecting to a computer over the Internet, aDomain Name Server translates the domain name into its corresponding IPaddress.

    IPSec - short for "IP Security" is the name of a security architecture and set ofprotocols commonly used to construct a VPN. These services work at the IP(Internet Protocol) or network layer and provide confidentiality and authentication

    as the packets move through networked devices.

    J2EE - Short for Java 2 Platform, Enterprise Edition, J2EE is a programmingplatform for developing and running distributed multi-tier architecture applications,based largely on modular components running on an application server.

  • 8/2/2019 Servers and Wireless

    5/26

    LAN - Local Area Network, which is a computer network, although geographicallylimited, usually to the same building, office, etc.

    LAMP - An acronym for a set of free software programs commonly used togetherto run dynamic Web sites:

    Linux, the operating system;Apache, the web server;MySQL, the database management system (or database server);Perl, PHP, and/or Python, scripting languages.

    LDAP - Lightweight Directory Access Protocol is a standard based on X.500, theOSI Directory Access Protocol (DAP). Just like a telephone directory will allow youto look up a telephone number by name, the LDAP standard for directories makesit possible for an LDAP compliant client to look up information thats contained incomputer systems and networks. Devices on a network like printers and faxmachines, users, e-mail addresses, and many more objects and attributes arestored in X.500 directories.

    Load Balancing - Distributing data across a network of servers in order to ensurethat a single web server does not get overloaded with work, thereby affectingperformance.

    Managed Backup - Refers to the copying of data for the purpose of having anadditional copy of an original source, specifically storing data on separate tapemedia not located on the server. If the original data is damaged or lost, the datamay be copied back from that source.

    Microsoft.NET, Passport - .NET Passport is Microsofts solution for federatedidentity management. It offers single sign-on (SSO) to multiple web-based serviceproviders, while protecting a users privacy in e-commerce transactions.

    Name Server - A server responsible for translating domain names and IPaddresses.

    NIST - National Institute of Standards and Technology (NIST) is a non-regulatoryfederal agency within the U.S. Commerce Department. NIST security publications(Special Publications in the 800 series) may be used by organizations to provide a

    structured, yet flexible framework for selecting, specifying, employing, andevaluating the security controls in information systems.

    NOC - Short for Network Operations Center, a hosting company's "home base," soto speak. The NOC is usually where most administration, technical support andphysical server storage takes place.

  • 8/2/2019 Servers and Wireless

    6/26

    ODBC - Open DataBase Connectivity A Microsoft standard for accessing differentdatabase systems from Windows, for instance Oracle or SQL.

    On-demand Software Software applications provided through networks (such asthe Internet) or as network-based services. On-demand software delivery, for local

    installation and use, is sometimes referred to as software on-demand.

    Operating system - A program that manages all other programs in a computer,such as Windows, Unix, Linux.

    Packet Switching - The method by which most data is exchanged throughout theInternet. Most data is broken down into smaller "packets" prior to transfer, andthen reassembled at the destination.

    Platform as a Service - A SaaS variation, delivering integrated developmentenvironments as a turn key service.

    PPTP (Point to Point Tunneling Protocol) is a VPN protocol that allows Point toPoint Protocol to be tunneled through an IP network.

    Protocol - The set of formal rules that describe how to transmit data, especiallyacross a network of computers.

    RAID - Short for Redundant Array of Independent Disks, a method of dataprotection/backup. Data is stored over a number of servers so that information willstill be accessible if a piece of hardware/software crashes.

    RARP (Reverse Address Resolution Protocol) is used by a host computer to obtainan IP address based on the address of the host's network card.

    Repeaters - Are used to connect any type of cable. They basically provide extrasignal strength when you exceed the length limits. Data is transmitted near thespeed of light on a network and the timing of transmitted data is crucial. Becauseof this, the path between any two nodes can't contain more than four repeaters.

    Router -The role of a router can be described as a bridge between two or morenetworks. The function of the router is to look at the destination addresses of the

    packets passing through it, and thereafter decide which route to send thesepackets on.

    RTP (Real-time Transport Protocol) A protocol that enables specializedapplications, such as Internet phone calls, video and audio, to occur in real time.

  • 8/2/2019 Servers and Wireless

    7/26

    SAN - Short for Storage Area Network, a network designed to attach computerstorage devices such as disk array controllers and tape libraries to servers. In astorage network, a server issues a request for specific blocks, or data segments,from specific disk drives. This method is known as block storage. The device actsin a similar fashion to an internal drive, accessing the specified block, and sending

    the response across the network.

    Scalability - The ability to adapt to rapid changes in demand, by dynamicallyadding or removing cloud resources based upon performance metrics and loadthresholds. In more advanced environments, these resource allocations and de-allocations are fully automated and near instantaneous, allowing for smoothoperation of services.

    Service Commerce Platforms - A hybrid of SaaS and managed service solutions,creating a cloud computing service offer as a full-service hub. These serviceplatforms are typically embedded, or integrated, with other service offerings toprovide a complete application. In some cases, service commerce platforms arefully self-contained, and targeted at vertical markets or trade groups as outsourcedIT environments.

    Service Level Agreement (SLA) - A formal written agreement made between twoparties: the service provider and the service recipient. The SLA itself defines thebasis of understanding between the two parties for delivery of the service itself.The document can be quite complex, and sometimes underpins a formal contract.Generally, an SLA should contain clauses that define a specified level of service,support options, incentive awards for service levels exceeded and/or penalty

    provisions for services not provided.

    SNMP (Simple Network Management Protocol) A widely used network monitoringand control protocol.

    Software-as-a-Service (SaaS) - Provisioning of software and applications over thepublic internet, or private networks, on a shared basis. SaaS applications typicallyprovide equivalent functionality to dedicated single-purchase applications,however, they are delivered and used on a month-by-month service contract orsubscription basis. Some components may be required to operate locally.

    SQL - Short for Standard Query Language. A standard protocol used to requestinformation from databases. Servers that can handle SQL are known as SQLservers.

    SSL - Short for Secure Sockets Layer, a protocol developed by Netscape to handleand protect confidential/sensitive information required for e-commercetransactions (like credit card numbers). SSL addresses usually begin with 'https'.

  • 8/2/2019 Servers and Wireless

    8/26

    SSL-VPN - Although the Secure Sockets Layer (SSL) is a protocol designedspecifically for web browsers to securely access web-based applications, the factthat it encrypts information and that it authenticates at least one of the parties,also makes it a Virtual Private Network (VPN). One of the best things about this

    protocol is that most computers have a browser; that means that no new softwareneeds to be added to the client in order to use this method. A very simplifiedexplanation of how it works is like this: The browser client asks for a securesession with the web server. If the web server can support an SSL session, it sayswhat it supports and sends back a certificate that includes the servers public keyas well as some other information to negotiate a secret key. The client checks thecertificate and decides whether to trust the server; if it does, it encrypts someinformation with the servers public key and sends it back. The information is usedto compute the secret key and the rest of the session is encrypted with thatshared secret (symmetric key cryptography).

    TCP / IP - Transmission Control Protocol / Internet Protocol This is the protocolthat defines the Internet. TCP / IP was originally designed for the unix operatingsystem, but is today available for every major kind of computer operating system.

    Telnet - A user command and TCP/IP protocol used for accessing remotecomputers.

    URL - Uniform Resource Locator The address of a file or Web page accessible onthe Internet (for example, http://www.wilson.ca).

    VPN - Virtual Private Networks (VPNs) allow private use of a public network. Theyenable mobile computers and other devices to connect to a companys privatenetwork by creating an encrypted tunnel from the network thats owned by thecompany, over the Internet and to the remote device on the other end. The mostcommonly used technologies to do this are Secure Sockets Layer (SSL) and IPSecurity (IPSec). These effectively extend the companys network, creating a

    Virtual Private Network.

    Web Hosting - Web hosting is a service that allows users to post web pages to theInternet. A web host, or hosting service provider (HSP), is a business that providesthe technologies and services needed for websites to be viewed on the web. Also

    called virtual hosting.

    XML - Short for Extensible Markup Language. XML is a language allowingdevelopers to create their own markup tags. All XML tags are defined by theprogrammer, and can be interpreted differently in different applications. For

  • 8/2/2019 Servers and Wireless

    9/26

    example, the "" tag in HTML means Italics, but could mean anything in XML,depending on the function the developer assigns to it.

    WIRELESS802.11 : an evolving family of specifications for wireless LANs, developed by aworking group of the Institute of Electrical and Electronics Engineers(IEEE).802.11 standards use the Ethernet protocol and CSMA/CA (carrier sense multipleaccess with collision avoidance) for path sharing.

    802.11a : provides specifications for wireless ATM systems. 802.11a is also used inwireless hubs. Networks using 802.11a operate at radio frequencies between

    5.725 GHz and 5.850 GHz. The specification uses a modulation scheme known asorthogonal frequency-division multiplexing (OFDM) that is especially well suited touse in office settings.

    802.11b : WLAN standard often called Wi-Fi; backward compatible with 802.11.Instead of the phase-shift keying (PSK) modulation method historically used in802.11 standards, 802.11b uses complementary code keying (CCK), which allowshigher data speeds and is less susceptible to multipath-propagation interference.

    802.11d : a wireless network communications specification for use in countrieswhere systems using other standards in the 802.11 family are not allowed to

    operate. Configuration can be fine-tuned at the Media Access Control layer (MAClayer) level to comply with the rules of the country or district in which the networkis to be used. Rules subject to variation include allowed frequencies, allowedpower levels, and allowed signal bandwidth. 802.11d facilitates global roaming.

    802.11e : a proposed adaptation to the 802.11a and 802.11b specifications thatenhances the 802.11 Media Access Control layer (MAC layer) with a coordinatedtime division multiple access (TDMA) construct, and adds error-correctingmechanisms for delay-sensitive applications such as voice and video. The 802.11especification provides seamless interoperability between business, home, and

    public environments such as airports and hotels and offers all subscribers high-speed Internet access with full-motion video, high-fidelity audio, and Voice over IP(VoIP).

    802.11g : offers transmission over relatively short distances at up to 54 megabitsper second (Mbps), compared with the 11 Mbps theoretical maximum of 802.11b.802.11g employs orthogonal frequency division multiplexing (OFDM), the

  • 8/2/2019 Servers and Wireless

    10/26

    modulation scheme used in 802.11a, to obtain higher data speed. Computers orterminals set up for 802.11g can fall back to speeds of 11 Mbps, so that 802.11band 802.11g devices can be compatible within a single network.

    802.11h : intended to resolve interference issues introduced by the use of 802.11a

    in some locations, particularly with military radar systems and medical devices.Dynamic frequency selection (DFS) detects the presence of other devices on achannel and automatically switches the network to another channel if and whensuch signals are detected. Transmit power control (TPC) reduces the radio-frequency (RF) output power of each network transmitter to a level that minimizesthe risk of interference.

    802.11i : provides improved encryption for networks that use 802.11a, 802.11b,and 802.11g standards. Requires new encryption key protocols, known asTemporal Key Integrity Protocol (TKIP) and Advanced Encryption Standard (AES).Other features include key caching, which facilitates fast reconnection to theserver for users who have temporarily gone offline, and pre-authentication, whichallows fast roaming and is ideal for use with advanced applications such as Voiceover Internet Protocol (VoIP).

    802.11j : proposed addition to the 802.11 family of standards that incorporatesJapanese regulatory extensions to 802.11a; the main intent is to add channels inthe radio-frequency (RF) band of 4.9 GHz to 5.0 GHz. WLANs using 802.11j willprovide for speeds of up to 54 Mbps, and will employ orthogonal frequencydivision multiplexing (OFDM). The specification will define how Japanese 802.11family WLANs and other wireless systems, particularly HiperLAN2 networks, can

    operate in geographic proximity without mutual interference.

    802.11k : proposed standard for how a WLAN should perform channel selection,roaming, and transmit power control (TPC) in order to optimize networkperformance. In a network conforming to 802.11k, if the access point (AP) havingthe strongest signal is loaded to capacity, a wireless device is connected to one ofthe underutilized APs. Even though the signal may be weaker, the overallthroughput is greater because more efficient use is made of the networkresources.

    802.11m : an initiative to perform editorial maintenance, corrections,improvements, clarifications, and interpretations relevant to documentation for802.11 family specifications. 802.11m also refers to the set of maintenancereleases itself.

    802.1X : standard designed to enhance 802.11 WLAN security. 802.1X provides anauthentication framework, allowing a user to be authenticated by a central

  • 8/2/2019 Servers and Wireless

    11/26

    authority. The actual algorithm that is used to determine whether a user isauthentic is left open and multiple algorithms are possible.

    Access Point (AP): a station that transmits and receives data (sometimes referred

    to as a transceiver). An access point connects users to other users within thenetwork and also can serve as the point of interconnection between the WLAN anda fixed wire network. The number of access points a WLAN needs is determinedby the number of users and the size of the network.

    Access Point Mapping (also called war driving): the act of locating and possiblyexploiting connections to WLANs while driving around a city or elsewhere. To dowar driving, you need a vehicle, a computer (which can be a laptop), a wirelessEthernet card set to work in promiscuous mode, and some kind of an antennawhich can be mounted on top of or positioned inside the car. Because a WLANmay have a range that extends beyond an office building, an outside user may beable to intrude into the network, obtain a free Internet connection, and possiblygain access to company records and other resources.

    Ad-hoc network : a LAN or other small network, especially one with wireless ortemporary plug-in connections, in which some of the network devices are part ofthe network only for the duration of a communications session or, in the case ofmobile or portable devices, while in some close proximity to the rest of thenetwork.

    Antenna : a specialized transducer that converts radio-frequency (RF) fields into

    alternating current (AC) or vice-versa. There are two basic types: the receivingantenna, which intercepts RF energy and delivers AC to electronic equipment, andthe transmitting antenna, which is fed with AC from electronic equipment andgenerates an RF field. Common use is to transmit and receive data from awireless networking bridge device to another antenna in the wireless network.Each antenna is always connected to a bridge, which provides the physicalconnection to the local area network.

    Bridge - Connects a local area network to another local area networkthrough radio waves. The bridged network design can consist of pointto-point, point to multi-point, or as a high-powered A/P and Bridge.

    dBi - The decibel units used to calculate the gain of an antenna. Thechange in power is referenced against an isotropic radiator, which is a

  • 8/2/2019 Servers and Wireless

    12/26

    theoretical ideal transmitter that produces a perfect electromagneticfield output. The sphere would extend in all directions with equalintensity, and at 100% efficiency, in 3-dimensions, similar to the raysof light produced by the sun.

    dBm - A dBm measurement is a measurement of absolute powerbased on the reference of 1 milliwatt (1 mW).

    Digital Pulse Wireless : (see also: ultra wideband or UWB) is a wireless technologyfor transmitting large amounts of digital data over a wide spectrum of frequencybands with very low power for a short distance. Ultra wideband radio can carry ahuge amount of data over a distance up to 230 feet at very low power (less than0.5 milliwatts), and has the ability to carry signals through doors and otherobstacles that tend to reflect signals at more limited bandwidths and a higherpower.

    EVIL TWIN : a home-made wireless access point that masquerades as a legitimateone to gather personal or corporate information without the end-user's knowledge.It's fairly easy for an attacker to create an evil twin by simply using a laptop, awireless card and some readily-available software. The attacker positions himselfin the vicinity of a legitimate Wi-Fi access point and lets his computer discoverwhat name and radio frequency the legitimate access point uses. He then sendsout his own radio signal, using the same name.

    Extensible Authentication Protocol (EAP): authentication protocol for wirelessnetworks that expands on methods used by the Point-to-Point Protocol (PPP), a

    protocol often used when connecting a computer to the Internet. EAP can supportmultiple authentication mechanisms, such as token cards, smart cards, certificates,one-time passwords, and public key encryption authentication.

    FIXED WIRELESS : wireless devices or systems in fixed locations such as homesand offices. Fixed wireless devices usually derive their electrical power from theutility mains, unlike mobile wireless or portable wireless which tend to be battery-powered. Although mobile and portable systems can be used in fixed locations,efficiency and bandwidth are compromised compared with fixed systems.

    Fresnel Zone - (pronounced 'fre-nel') The area around the line-of-sightbetween WLAN bridge antennas that radio waves spread out intoafter they leave the antenna. This area must be clear or the strengthof the signal will weaken.

    Gain - The measurement used to indicate the frequency and range fora WLAN bridge antenna. As the number increases in a WLAN bridgeantenna, the coverage area becomes narrower and the distance of the

  • 8/2/2019 Servers and Wireless

    13/26

    coverage area becomes longer.

    HiperLAN : WLAN communication standards primarily used in European countries.There are two specifications: HiperLAN/1 and HiperLAN/2. Both have beenadopted by the European Telecommunications Standards Institute (ETSI). The

    HiperLAN standards provide features and capabilities similar to 802.11. HiperLAN/1provides communications at up to 20 Mbps in the 5-GHz range of the radiofrequency (RF) spectrum.

    HOT SPOT : (see also access point) a WLAN node that provides Internetconnection and virtual private network (VPN) access from a given location. Abusiness traveller, for example, with a laptop equipped for Wi-Fi can look up alocal hot spot, contact it, and get connected through its network to reach theInternet and their own company remotely with a secure connection. Increasingly,public places, such as airports, hotels, and coffee shops are providing free wirelessaccess for customers.

    HOT ZONE : a wireless access area created by multiple hot spots located in closeproximity to each other. Hot zones usually combine public safety access pointswith public hot spots. Each hot spot typically provides network access for distancesbetween 100 and 300 feet; various technologies, such as mesh network topologiesand fiber optic backbones, are used in conjunction with the hot spots to createareas of coverage.

    IMT-2000 direct spread official name for W-CDMA (Wideband Code-DivisionMultiple Access): ITU standard derived from Code-Division Multiple Access

    (CDMA). W-CDMA is a third-generation (3G) mobile wireless technology thatpromises much higher data speeds to mobile and portable wireless devices thancommonly offered in today's market.

    IrDA : (Infrared Data Association) an industry-sponsored organization set up in1993 to create international standards for the hardware and software used ininfrared communication links. In this special form of radio transmission, a focusedray of light in the infrared frequency spectrum, measured in terahertz, or trillionsof hertz (cycles per second), is modulated with information and sent from atransmitter to a receiver over a relatively short distance.

    IR WIRELESS : the use of wireless technology in devices or systems that conveydata through infrared (IR) radiation. Infrared is electromagnetic energy at awavelength or wavelengths somewhat longer than those of red light. The shortest-

  • 8/2/2019 Servers and Wireless

    14/26

    wavelength IR borders visible red in the electromagnetic radiation spectrum; thelongest-wavelength IR borders radio waves.

    MICROWAVE : electromagnetic energy having a frequency higher than 1 gigahertz(billions of cycles per second), corresponding to wavelength shorter than 30

    centimeters. Microwave signals propagate in straight lines and are affected verylittle by the troposphere. They are not refracted or reflected by ionized regions inthe upper atmosphere. Microwave beams do not readily diffract around barrierssuch as hills, mountains, and large human-made structures.

    MIMO (multiple input, multiple output): an antenna technology for wirelesscommunications in which multiple antennas are used at both the source(transmitter) and the destination (receiver). The antennas at each end of thecommunications circuit are combined to minimize errors and optimize data speed.MIMO is one of several forms of smart antenna technology, the others being MISO(multiple input, single output) and SIMO (single input, multiple output).

    MISO (multiple input, single output): an antenna technology for wirelesscommunications in which multiple antennas are used at the source (transmitter).The antennas are combined to minimize errors and optimize data speed. Thedestination (receiver) has only one antenna. MISO is one of several forms of smartantenna technology, the others being MIMO (multiple input, multiple output) andSIMO (single input, multiple output).

    Near Field Communication (NFC): a short-range wireless connectivity standard(Ecma-340, ISO/IEC 18092) that uses magnetic field induction to enable

    communication between devices when they're touched together, or brought withina few centimeters of each other. The standard specifies a way for the devices toestablish a peer-to-peer (P2P) network to exchange data.

    Omni-directional Antenna - A wireless bridge networking deviceused to achieve extended distances between WLAN locations.Typically used at the central location in a point to multi-pointapplication.

    OPTICAL WIRELESS : the combined use of conventional radio-frequency (RF)wireless and optical fiber for telecommunication. Long-range links are provided byoptical fiber and links from the long-range end-points to end users areaccomplished by RF wireless or laser systems. RF wireless at ultra-high frequencies

  • 8/2/2019 Servers and Wireless

    15/26

    (UHF) and microwave frequencies can carry broadband signals to individualcomputers at substantial data speeds.

    Point-to-Point Wireless Bridge Networking - A cost-effectivemeans of connecting remote locations to alleviate the need for

    expensive T1 or Fiber installations.

    PC Card Client - Plugs into the PCMCIA slot on a laptop computerproviding a connection to an Access Point in a Wireless Network.

    Point to Multi-point Wireless Bridge Networking - A cost-effectivemeans of connecting multiple remote locations back to a centrallocation to alleviate the need for expensive T1 or Fiber installations.

    Power over Ethernet (PoE) - A method of delivering DC power toWireless Access Point or Bridge devices through the category 5Ethernet cabling. Typically used in installations where AC power is notavailable to achieve optimum positioning of the devices.

    RADIUS - Remote Authentication Dial In User Service (RADIUS) is anauthentication and accounting system used by many Internet ServiceProviders (ISPs). When users dial in to the ISP they must enter ausername and password. This information is passed to a RADIUSserver, which checks that the information is correct, and thenauthorizes access to the ISP system.

    Router - A device that is used to connect user to a fixed wire localarea network through a UTP or Fiber connection.

    RADIO FREQUENCY (RF): alternating current (AC) having characteristics such that,if the current is input to an antenna, an electromagnetic (EM) field is generatedsuitable for wireless broadcasting and/or communications.

    Sector-directional Antenna - A wireless bridge networking deviceused to achieve extended distances between WLAN locations.Typically used for point-to-point locations or at each remote location ina point to multi-point application.

    SWAN (Structured Wireless-Aware Network): a technology that incorporates aWLAN into a wired wide-area network (WAN). SWAN technology can enable anexisting wired network to serve hundreds of users, organizations, corporations, or

  • 8/2/2019 Servers and Wireless

    16/26

    agencies over a large geographic area. A SWAN is said to be scalable, secure, andreliable.

    TRANSPONDER : a wireless communications, monitoring, or control device thatpicks up and automatically responds to an incoming signal. The term is a

    contraction of the words transmitter and responder. Transponders can be eitherpassive or active.

    ULTRA WIDEBAND (UWB): (see also: digital pulse wireless) is a wirelesstechnology for transmitting large amounts of digital data over a wide spectrum offrequency bands with very low power for a short distance. Ultra widebandbroadcasts very precisely timed digital pulses on a carrier signal across a very widespectrum (number of frequency channels) at the same time. UWB can carry ahuge amount of data over a distance up to 230 feet at very low power (less than0.5 milliwatts), and has the ability to carry signals through doors and otherobstacles that tend to reflect signals at more limited bandwidths and a higherpower.

    USB Client - Plugs into the USB port on an IBM-compatible computerproviding a connection to an Access Point in a Wireless Network.

    VIRTUAL PRIVATE NETWORK (VPN): a network that uses a publictelecommunication infrastructure, such as the Internet, to provide remote officesor individual users with secure access to their organization's network. A VPNensures privacy through security procedures and tunneling protocols such as theLayer Two Tunneling Protocol ( L2TP ). Data is encrypted at the sending end and

    decrypted at the receiving end.

    VoWLAN (Voice over WLAN, sometimes called wireless VoIP, Wi-Fi VoIP): amethod of routing telephone calls for mobile users over the Internet using thetechnology specified in IEEE 802.11b. Routing mobile calls over the Internetmakes them free, or at least much less expensive than they would be otherwise.

    WAP (Wireless Application Protocol): a specification for a set of communicationprotocols to standardize the way that wireless devices, such as cellular telephonesand radio transceivers, can be used for Internet access, including e-mail, theWorld Wide Web, newsgroups, and instant messaging.

    WEP - Wired Equivalent Privacy (WEP) is an optional IEEE802.11function that offers frame transmission privacy similar to a wirednetwork. Secret shared encryption keys are generated that both

  • 8/2/2019 Servers and Wireless

    17/26

    source and destination stations can use to alter frame bits. Thisprovides additional security against unauthorized access to thewireless network.

    WDS - Wireless Distribution Systems (WDS) allow network

    administrators to wirelessly connect Access Points and provide accessto the wired infrastructure for locations where cabling is not possible orcostly to implement.

    WPA - Wi-Fi Protected Access (WPA) is designed to be available as afirmware upgrade for legacy hardware already running WEP, by addinga layer of security on top of WEP to fix all the known weaknesses inWEP. It is also designed to be compatible with the full 802.11istandard or RSN.

    WAR DRIVING (also called access point mapping):, the act of locating and possiblyexploiting connections to WLANs while driving around a city or elsewhere. To dowar driving, you need a vehicle, a computer (which can be a laptop), a wirelessEthernet card set to work in promiscuous mode, and some kind of an antennawhich can be mounted on top of or positioned inside the car. Because a WLANmay have a range that extends beyond an office building, an outside user may beable to intrude into the network, obtain a free Internet connection, and possiblygain access to company records and other resources.

    W-CDMA (Wideband Code-Division Multiple Access): officially known as IMT-2000direct spread; ITU standard derived from Code-Division Multiple Access (CDMA).

    W-CDMA is a third-generation (3G) mobile wireless technology that promises muchhigher data speeds to mobile and portable wireless devices than commonly offeredin today's market.

    Wi-Fi (short for wireless fidelity): a term for certain types of WLANs. Wi-Fi canapply to products that use any 802.11 standard. Wi-Fi has gained acceptance inmany businesses, agencies, schools, and homes as an alternative to a wired LAN.Many airports, hotels, and fast-food facilities offer public access to Wi-Fi networks.

    WiMAX : a wireless industry coalition whose members organized to advance IEEE802.16 standards for broadband wireless access (BWA) networks. WiMAX 802.16technology is expected to enable multimedia applications with wireless connectionand, with a range of up to 30 miles, enable networks to have a wireless last mile

  • 8/2/2019 Servers and Wireless

    18/26

    solution. According to the WiMAX forum, the group's aim is to promote and certifycompatibility and interoperability of devices based on the 802.16 specification, andto develop such devices for the marketplace.

    Wired Equivalent Privacy (WEP): a security protocol specified in 802.11b, designed

    to provide a WLAN with a level of security and privacy comparable to what isusually expected of a wired LAN. Data encryption protects the vulnerable wirelesslink between clients and access points; once this measure has been taken, othertypical LAN security mechanisms such as password protection, end-to-endencryption, virtual private networks (VPNs), and authentication can be put in placeto ensure privacy.

    Wireless : describes telecommunications in which electromagnetic waves (ratherthan some form of wire) carry the signal over part or all of the communicationpath.

    Wireless Abstract XML (WAX): an abstract markup language and associated toolsthat facilitate wireless application development. The major features of WAXinclude: the WAX language itself; translation stylesheets, which are used totranslate the WAX language into the most suitable language for the requestingdevice; the device registry, which includes an XML database of device particulars;dynamic image and text selection, which allows content to be written a single timefor multiple transformations; and the application foundation, a WAX servlet thatcreates a foundation for WAX applications.

    Wireless application service provider (WASP): provides Web-based access to

    applications and services that would otherwise have to be stored locally and makesit possible for customers to access the service from a variety of wireless devices,such as a smartphone or personal digital assistant (PDA).

    Wireless ISP (WISP): an Internet service provider (ISP) that allows subscribers toconnect to a server at designated hot spots (access points) using a wirelessconnection such as Wi-Fi. This type of ISP offers broadband service and allowssubscriber computers, called stations, to access the Internet and the Web fromanywhere within the zone of coverage provided by the server antenna, usually aregion with a radius of several kilometers.

    Wireless Networking Clients - A wireless networking access pointuses client cards to send and receive data with mobile users. Laptopcomputers typically use a PC Card in the PCMCIA slot, while IBMcompatiblePC's use USB clients to connect to the USB port on their

  • 8/2/2019 Servers and Wireless

    19/26

    computer.

    Wireless LAN (WLAN) - A wireless LAN uses a wireless connection,such as a Wireless Access Point and Clients or a Wireless Bridge, toconnect mobile users to a local area network. WLANs are frequently some portion

    of a wired LAN.

    Wireless Service Provider : a company that offers transmission services to users ofwireless devices through radio frequency (RF) signals rather than through end-to-end wire communication.

    Wireless Transport Layer Security (WTLS): the security level for WirelessApplication Protocol (WAP) applications, developed to address the problematicissues surrounding mobile network devices - such as limited processing power andmemory capacity, and low bandwidth - and to provide adequate authentication,data integrity, and privacy protection mechanisms.

    Yagi antenna (sometimes called a Yagi-Uda array or simply a Yagi): aunidirectional antenna commonly used in communications when a frequency isabove 10 MHz.

    E- MAIL & INTERNET

    Above the fold: The top part of an email message that is visible to the recipientwithout the need for scrolling. The term originally comes from print and refers tothe top half of a folded newspaper.

  • 8/2/2019 Servers and Wireless

    20/26

    Alias: A unique and usually shorter URL (link) that can be distinguished fromother links even if they ultimately go to the same Web page. This makes itpossible to track which message led viewers to click on the link.

    Attachment: An audio, video or other data file that is attached to an emailmessage.

    Autoresponder: A computer program that automatically responds with aprewritten message to anyone who sends an email message to a particular emailaddress or uses an online feedback form.

    Authentication: A term that refers to standards, such as Sender ID, SPF andDomainKeys/DKIM, that serve to identify that an email is really sent from thedomain name and individual listed as the sender. Authentication standards areused to fight spam and spoofing.

    Bayesian filter: A spam filter that evaluates email message content todetermine the probability that it is spam. Bayesian filters are adaptable and canlearn to identify new patterns of spam by analyzing incoming email.

    Blacklist: A list containing email addresses or IP addresses of suspectedspammers. Blacklists are sometimes used to reject incoming mail at the serverlevel before the email reaches the recipient.

    Block: An action by an Internet Service Provider to prevent email messages frombeing forwarded to the end recipient.

    Bounces: Email messages that fail to reach their intended destination. "Hard"bounces are caused by invalid email addresses, whereas "soft" bounces are due totemporary conditions, such as overloaded inboxes.

    Challenge-Response: An authentication method that requires a human torespond to an email challenge message before the original email that triggered thechallenge is delivered to the recipient. This method is sometimes used to cut downon spam since it requires an action by a human sender.

    Click-through tracking: The process of tracking how many recipients clicked ona particular link in an email message. This is commonly done to measure thesuccess of email marketing campaigns.

    Click-through rate: In an email marketing campaign, the percentage ofrecipients who clicked on a particular link within the email message.

  • 8/2/2019 Servers and Wireless

    21/26

    Conditional blocks: A text fragment that is pasted into an email message only ifcertain conditions are met (for instance the recipient lives in a certain area).Conditional blocks allow email marketers to create more personalized mailings.

    Conversion rate: A measure of success for an email marketing campaign (forinstance the number of recipients who completed a purchase). With emailmarketing, conversion rates are relatively easy to calculate because of thetechnology's measurable nature.

    Deliverability: A term that refers to the best practices and authenticationtechniques of mass email communication that improve the likelihood that opt-inemail messages are successfully delivered to end recipients instead of beingerroneously blocked by ISPs and spam filters.

    DomainKeys/DKIM: DKIM is an email authentication protocol that enables thesender to use public-key cryptography to sign outgoing emails in a manner that

    can be verified by the receiver. The DKIM specification is based on the priorprotocols Domain Keys and Identified Internet Mail. DKIM is defined in IETF RFC4871. The DKIM standard is already being adopted by Gmail and other largecorporations to completely eliminate phishing and spoofing from internet mail.

    Domain name: A name that identifies one or more IP addresses. Domain namesalways have at least two parts that are separated by dots (for instance wilson.ca).The part on the left is the second-level domain (more specific), while the part onthe right is the top-level domain (more general).

    Domain Throttling: A technique that allows you to limit the number of emailmessages sent to a domain within a certain time frame. It is used to comply withISPs and to avoid tripping spam filters. Many ISPs have their own policies andpreferred limits.

    Double opt-in: The recommended procedure for subscribing email recipients toan email list or newsletter. Once a person requests to subscribe to a list, aconfirmation email message is automatically sent to the supplied email addressasking the person to verify that they have in fact requested to be included infuture mailings.

    E-mail: Email allows you to send and receive text, HTML, images and other datafiles over the Internet. Email is one of the most popular online activities and hasbecome a vital tool for electronic commerce.

  • 8/2/2019 Servers and Wireless

    22/26

    Email bounces: Email messages that fail to reach their intended destination."Hard" bounces are caused by invalid email addresses, whereas "soft" bounces aredue to temporary conditions, such as overloaded inboxes.

    Email client: The software that recipients use to read email. Some email clientshave better support for HTML email than others.

    Email harvesting: The disreputable and often illegal practice of using anautomated program to scan Web pages and collect email addresses for use byspammers.

    Email header: The section of an email message that contains the sender's andrecipient's email addresses as well as the routing information.

    Email marketing: The use of email (or email lists) to plan and deliverpermission-based marketing campaigns.

    False positive: A legitimate email message that is mistakenly rejected or filteredby a spam filter.

    Hard bounces: Email messages that cannot be delivered to the recipientbecause of a permanent error, such as an invalid or non-existing email address.

    IMAP: Internet Message Access Protocol A protocol used to retrieve emailmessages. Most email clients use either the IMAP or the POP3 protocol.

    ISP: Internet Service Provider A company that provides access to the Internet,including the World Wide Web and email, typically for a monthly fee.Mail-merge: A process that enables the delivery of personalized messages tolarge numbers of recipients. This is usually achieved using email list managementsoftware working in conjunction with a database.

    Mail server - A mail server is a computer server which handles email traffic -that is, emails being sent and received across a network. Email servers are run byinternet service providers (ISPs), and email or webmail providers such as Microsoft(for Hotmail) and Google (for Google Mail). The emails are sent between mail

  • 8/2/2019 Servers and Wireless

    23/26

    servers using a protocol called SMTP. Users do not usually interact directly withmail servers; instead, they send and receive emails using an email client, whichtalks to the mail servers to which it is assigned. This is done using a protocolcalled POP3.

    Merge-purge: The act of removing duplicate email addresses from a coalescedlist that is composed of two or more existing lists.

    Message Transfer Agent (MTA) - Any system running SMTP routing softwarethat can take a message, process it, look up destination information in DNS (orother routing table), and deliver to the intended receiving system. MTAs aretypically server applications such as Sendmail, Microsoft Exchange, Postfix, LotusDomino, qmail, PowerMTA, etc.

    MIME: Multi-Purpose Internet Mail Extensions An extension of the originalInternet email standard that allows users to exchange text, audio or visual files.

    Moderated list: Moderators must approve any message posted to an email listbefore it is delivered to all subscribers. It is also possible for the moderator to editor delete messages. A moderated list thus puts the list owner in the equivalentposition as an editor of a newspaper.

    Multi-threading: A process though which a mail server can perform multipleconcurrent deliveries to different domains, which greatly speeds up the delivery oflarge volumes of email.

    Multipart/alternative: A message format that includes both text and HTMLversions. Recipients can then open the message in their preferred format.Offload: To assume part of the processing demand from another device.Open-relay: Open-relay is the third-party relaying of email messages though amail server. Spammers looking to obscure or hide the source of large volumemailings often use mail servers with open-relay vulnerabilities to deliver their emailmessages.

    Out-of-office replies: Automatic email reply messages triggered by incomingemail to a user's inbox, typically activated when users are on vacation or otherwiseunavailable through email for an extended period.

    Plain text: Text in an email message that contains no formatting elements.

  • 8/2/2019 Servers and Wireless

    24/26

    POP: Post Office Protocol A protocol used to retrieve email from a mail server.Most email clients use either the POP3 or the newer IMAP protocol.

    Query: A subset of records in a database. Queries may be used to create highlyspecified demographics in order to maximize the effectiveness of an email

    marketing campaign.

    Reverse DNS Lookup: A Reverse DNS Lookup is the process of looking up andtranslating an IP address into a domain name. This can be compared to a ForwardDNS Lookup, which is the process of looking up and translating a domain nameinto its corresponding IP address.

    Rich media: An Internet advertising term for a Web page that uses graphicaltechnologies such as streaming video, audio files or other similar technology tocreate an interactive atmosphere with viewers.

    Scalability: The ability of a software program to continue to function smoothly asadditional volume, or work is required of it.

    Secure SMTP - extension to the SMTP service that allows an SMTP server andclient to use TLS (Transport Layer Security) to provide private, authenticatedcommunication over the Internet

    Sender ID: Sender ID is an authentication protocol used to verify that theoriginating IP address is authorized to send email for the domain name declared inthe visible "From" or "Sender" lines of the email message. Sender ID is used to

    prevent spoofing and to identify messages with visible domain names that havebeen forged.

    Sender Policy Framework (SPF) - SPF is a path-based email authenticationprotocol that allows email receivers to determine if the sender is authorized to usethe domains in the messages header by evaluating the IP address of the sendersoutbound MTA based on information published by the sender in DNS TXT records.SPF is defined in IETF RFC 4408.

    Shareware: This term refers to software available on public networks.Signature file: A short text file that email users can automatically append at theend of each message they send. Commonly, signature files list the user's name,phone number, company, company URL, etc.

    S/MIME - S/MIME (Secure/Multipurpose Internet Mail Extensions) is a protocolthat adds digital signatures and encryption to Internet MIME (MultipurposeInternet Mail Extensions) messages. MIME is the standard for Internet mail that

  • 8/2/2019 Servers and Wireless

    25/26

    makes it possible to send more than text. A mail message is splits into two parts,the header, which contains the information needed to move the mail from thesource to its destination and the body. The MIME structure allows an e-mail bodyto contain graphics, audio and many other features that improve communicationover simple text. Almost all modern e-mail systems support it.

    SMTP: Simple Mail Transfer Protocol A protocol used to send email on theInternet. SMTP is a set of rules regarding the interaction between a programsending email and a program receiving email.

    Soft bounces: Email messages that cannot be delivered to the recipient becauseof a temporary error, such as a full mailbox.

    Spam: (Also known as unsolicited commercial email) Unwanted, unsolicited junkemail sent to a large number of recipients.

    SPF: Sender Policy Framework An authentication protocol used by recipient sitesto verify that the originating IP address is authorized to send email for the domainname declared in the "MAIL FROM" line of the mail envelope. SPF is used toidentify messages with forged "MAIL FROM" addresses.

    Spoofing The disreputable and often illegal act of falsifying the sender emailaddress to make it appear as if an email message came from somewhere else.

    Streaming media: Audio and video files transmitted on the Internet in acontinuous fashion.

    Subject line: The part of an email message where senders can type what theemail message is about. Subject lines are considered important by email marketersbecause they can often influence whether a recipient will open an email message.

    Transport Layer Security (TLS) - The TLS protocol provides communicationssecurity over the Internet. The protocol allows client/server applications tocommunicate in a way that is designed to prevent eavesdropping, tampering, ormessage forgery. TLS is an IETF standards track protocol, last updated in RFC5246.

    Tracking: In an email marketing campaign, measuring behavioral activities suchas click-throughs and open-ups.

    User Interface: A set of controls such as buttons, commands and other devicesthat allow a user to operate a computer program.

  • 8/2/2019 Servers and Wireless

    26/26

    Virus: A program, macro or fragment of code that causes damage and can bequickly spread through Web sites or email.

    Whitelist: A list of pre-authorized email addresses from which email messagescan be delivered regardless of spam filters.

    Worm: Malicious code that is often spread through an executable attachment inan email message.