Prerequisites: Students must have basic knowledge and skills in ...

loyalsockvillemobNetworking and Communications

Oct 27, 2013 (3 years and 9 months ago)

78 views


Developed May 2007

Networking Basics


Page
1






This course will prepare the student in the area
of networking for the small office,

home
office (SOHO) market, and
prepare
him or her

with
the ability to work in small
businesses or

organizations using networks that have fewer than 100 nodes.
Prepar
ation
will be given the student
for performing
the following tasks:

install and configure Cisco
switches and routers in multiprotocol

internetworks using LAN and WAN interfaces
;
p
rovide Level 1 troubleshooting service
; i
mprove network performance and secur
ity
;
p
erform en
try
-
level tasks in the planning,

design, installation, operation, and

troubleshooting of Ethernet and TCP/IP networks.

Upon completion of this course,
students will be able to perform tasks related to

the following:

n
etworking mathematic
s,

t
erminology, and models
; n
etworking media such as copper, optical, and wireless
; t
esting
and cabling LANs and WANs
; E
thernet Operation and 10/100/1000/10 G versions of
Ethernet
;
Ethernet
,
Switching
;
IP addressing and subnetting
; and
IP, TCP, UDP, and
applic
ation layer protocols
.

The course has been designed
to require lab activities as well
as covering curriculum content.

This course is an

important

first

step toward achieving
Cisco Certified Network Associate (
CCNA
)

certification.

Prerequisite
s
:

Students mu
st have basic knowledge and skills in computer hardware and
software systems. This is a very rigorous, technical computer course offering. Students
should have passed Algebra I and Physical Science with a grade of “C” or better.



Table of Contents



Intr
oduction to Computers and Applications

................................
...........
2


Personal Computer Software

................................
................................
...
2


Connecting to the Network

................................
................................
......
3


Connecting to the Internet Using An Internet Service Provider

..............
4


Network Addressing

................................
................................
................
5


Network Services

................................
................................
.....................
6


Wireless Technology
................................
................................
................
6


Basic Security

................................
................................
..........................
7


Trouble
shooting Your Network

................................
...............................
7


Acronyms

................................
................................
................................
.
9

Networking Basics



Developed May 2007

Networking Basics


Page
2

Networking Basics

Content Guideline


(The student will be able to . . .)


Unit One

Introduction to Computers and Applications


1.

Describe the purpose/functionality of the PC and applications including Internet
application
s.

a.

Identify the multiple uses of a computer.

b.

Identify common types and classifications of applications.

2.

Compare and contrast different types of computing devices.

a.

Identify the different types of computers.

b.

Describe the features of a server, desktop, a
nd workstation and how they are
used.

c.

Describe the different types of portable devices and how they are used.

3.

Explain the digital representation of common forms of data.

a.

Explain how any information can be represented digitally.

b.

Convert app
roximately be
tween bits and

bytes,

bytes and

k
ilobytes,

kilobytes
and
megabytes, and
megabytes and
g
igabytes.

c.

Demonstrate familiarity with other relevant binary information.

4.

Determine appropriate components and peripheral devices to meet requirements.

a.

Determine the r
equirements for a computer purchase.

b.

Describe the purpose of and select the type of motherboard.

c.

Describe the purpose of and select the processor.

d.

Describe the purpose of RAM and determine RAM requirements.

e.

Describe the purpose of a
dapter
c
ards and det
ermine AC requirements.

f.

Describe the purpose of storage devices and determine storage requirements.

g.

Describe the purpose of peripheral devices and determine peripheral device
requirements.

h.

Describe the purpose of UPS and surge protectors and why

they are

important.

5.

Install, verify, and upgrade computer components and peripherals.

a.

Describe computer repair and safety best practices.

b.

Install components and verify operation.

c.

Install
peripheral devices and verify

operation.


Unit Two

Personal Computer Softw
are


1.

Explain the function of an
OS
.

a.

Describe the purpose of an OS.

b.

Identify common operating systems.

c.

Describe the features and hardware requirements of Windows XP.

d.

Describe the features and hardware requirements for Linux.


Developed May 2007

Networking Basics


Page
3

e.

Describe how to select an op
erating system.

2.

Perform a simulated installation of an operating system.

a.

Describe and select an installation method for an operating system.

b.

Describe how to complete a pre
-
installation checklist for installing an operating
system
.

c.

Prepare your computer
to participate in the network.

d.

Describe the purpose of naming scheme.

e.

Describe how to plan for multiple devices on a network.

f.

Install the operating s
ystem.

3.

Explain the purpose of and install application patches.

a.

Describe the purpose of a patch.

b.

Ident
ify how patches are applied.

c.

Identify the source of patches.


Unit Three

Connecting to the Network


1.

Explain the concept of networking and the benefits of networks.

a.

Define the term network and identify various types of networks.

b.

Describe the benefits an
d impacts of computer networking.

c.

Define the high level components of an
i
nformation network.

d.

Describe the roles of computers on a network.

e.

Differentiate between logical and physical topologies, and explain how networks
are represented graphically.

2.

Exp
lain the concept of communication protocols.

a.

U
se various analogies between human and computer communications to explain
the concept of a protocol.

b.

Explain the concept of human communication in terms of source, channel, and
destination.

c.

Explain the need
for rules and protocols in order for communications to occur.

d.

Explain the concept of encoding in relation to human communication.

e.

Explain the concept of formatted message and encapsulation in relation to human
communication.

f.

Explain that message
s

have f
inite unit sizes in relation to human communication.

g.

Explain the concept of timing in communication in relation to human
communication.

h.

Explain standard message patterns in relation to human communication.

i.

Relate human communications
concepts to the ter
m “protocol.”


3.

Explain how communication occurs across a local Ethernet network.

a.

E
xplain communication on a local Ethernet network.

b.

Explain that devices on a local network must share common protocols to
communicate (Communicating by the Rules).

c.

Identify

the importance of standardization in computer communication protocols.

d.

Identify the source, destination and channel in an Ethernet network.

e.

Describe basic characteristics of Ethernet for communicating across the channel.

f.

Describe the need for a hierarc
hical design in an Ethernet network.


Developed May 2007

Networking Basics


Page
4

g.

Explain the purpose of a logical network address.

h.

Describe characteristics and devices associated with access and distribution.

4.

Describe a
ccess
l
ayer
d
evices and communication methods on a local Ethernet
network.

a.

D
e
scribe access layer networking devices and communication methods used to
connect local Ethernet networks
.

b.

Describe the purpose of the a
ccess
l
ayer and how

it is used within an Ethernet
n
etwork.

c.

Describe the function of a hub.

d.

Describe the function of a s
witch.

e.

Describe the use of
broadcast

messaging for communication on a local Ethernet
network.

f.

Describe the need for both the MAC and IP address within an Ethernet network.

g.

Describe ARP and how it is used.

5.

Describe d
istribution
l
ayer devices and communi
cation methods across networks.

a.

Describe the reasons for

expanding your network with a d
istribution
l
ayer.

b.

Describe the function of routers.

c.

Explain the concept of the gateway router.

d.

Differentiate between the rules governing communications within a si
ngle local
network and between multiple local networks.

e.

Describe the concept of a LAN.

f.

Describe implications of adding hosts to a local network versus a remote
network.

g.

Des
cribe how the router keeps track

of multiple networks using routing and ARP
table
s.

h.

Use
a
packet t
racer.

6.

Plan, implement, and verify a local network.

a.

Plan and document the building of a small home or small business Ethernet
network.

b.

Build a virtual model of a small home or small business network.

c.

Describe the function of multifunc
tion devices.

d.

Explain the components and interfaces of a small home or small business
network ISR.

e.

Connect and properly document the network installation.

f.

Configure your PCs to participate in the local network.

g.

Perform simple workgroup tasks.


Unit Fou
r

Connecting to the Internet Using An Internet Service Provider


1.

E
xplain “w
hat is the Internet?” and how we connect to the Internet.

a.

Define an
ISP

and its purpose.

b.

Describe how you connect to the Internet through the ISP and the ISP’s
relationship to the

Internet.

c.

Identify and describe different connection options of an ISP.

d.

Identify and describe the levels of service offered by an ISP.


Developed May 2007

Networking Basics


Page
5

2.

Explain how information is sent across the Internet through an ISP.

a.

Define and explain that the most important
p
roto
col of the Internet is the IP.

b.

E
xplain IP address management as the responsibility of ISPs.

c.

Explain how ISP

NOC handles packets from your home network.

d.

Describe how data travels within the Internet.

3.

Describe and identify the components of an ISP

NOC.

a.

Identify and describe the concept of the Internet cloud.

b.

Identify and describe the network devices used within the ISP to connect to the
Internet cloud.

c.

Physical requirements of a home network versus an ISP NOC (cloud).

4.

Identify the different types of
cables and connectors for connecting the devices in a
NOC.
(Note: B
e sure to
include

autosense, different pinout

for Gb, what ships with
d
evice.)

a.

Identify and describe common types of cables
.


b.

Describe twisted p
air cables, common terminations

and when they

are used.

c.

Describe optical fi
ber cables, common terminations

and when they are used.
(
Note: Careful about depth


not a lot of homes and SMBs use fiber
.)


d.

Describe c
oax cable, common terminations

and when they are used.

5.

Construct and terminate twisted p
air cables and determine type of cable needed.

a.

Define cable standards and their purpose
.


b.

Identify and describe the cross
-
over and straight through cable pinouts and color
codes.

c.

Describe how to terminate cables.

d.

Describe how to punch down wires to patc
h panel and wall jacks.

e.

Describe how to test cable termination and functionality.

f.

Describe cabling best practices.


Unit Five

Network Addressing


1.

Describe th
e purpose of an IP address and subnet m
ask and how they are used on the
Internet.

a.

Review the pu
rpose of the IP address.

b.

Describe the structure of an IP address.

c.

Identify and describe the parts of the IP address and their purpose.

d.

Describe a subnet mask and its purpose.

2.

Describe the types of IP Addresses available.

a.

Describe the classes of IP add
ress and the default
s
ubnet mask.

b.

Describe private and public addressing and when each is used.

c.

Differentiate between u
nicast,
b
roadcast,
m
ulticast
a
ddresses.

d.

Describe the interaction of unicast, b
roadcast, and
m
ulticast IP addresses to MAC
addresses.

3.

D
escribe the methods of obtaining an IP Address.

a.

Review the methods of assigning an IP Address.

b.

Describe where the DHCP services are located.

c.

Configure and verify DCHP range on the GUI
-
based home
-
ISR.


Developed May 2007

Networking Basics


Page
6

4.

Describe IP network boundaries and the purpose of NA
T on a home network.

a.

Describe the boundaries of a network and the purpose of default gateway.

b.

Describe addresses assigned by the ISP vs.
ISR
assigned
.


c.

Describe the purpose and function of NAT.

d.

Describe the use of NAT on a home or small business network

using

an ISR.


Unit Six

Network Services


1.

Compare and contrast clients and servers and their interaction over the network.

a.

Review the client/server relationship.

b.

Identify common services available within a client/server relationship.

c.

Differentiate betwe
en connectionless versus connection
-
oriented protocols.

d.

Describe the function of a port.

2.

Describe the type of interactions of Internet applications.

a.

Describe DNS and its purpose.

b.

Describe the interaction between a web client and a web server.

c.

Describe
the interaction between an
FTP

client and an FTP server.

d.

Describe the interaction
between
email clients and email servers.

e.

Describe the interaction of IM/peer
-
to
-
peer clients and servers.

f.

Describe the interaction of voice clients and servers.

3.

Describe t
he purpose of a layered model to illustrate the interaction of various
protocols.

a.

Describe how different protocols interact on a host.

b.

Describe protocol operation when sending a message.

c.

Describe protocol operation when receiving a message.

d.

Describe mod
els that represent protocol stacks.


Unit Seven

Wireless Technology


1.

Describe w
ireless technology.

a.

Describe the various wireless technologies and the devices that use them.

b.

Describe the benefits and limitations of wireless

technology
.

c.

Define wireless net
works and their boundaries.

2.

Describe the various components and structure of a wireless LAN.

a.

Identify and describe wireless LAN standards.

b.

Identify and describe common wireless LAN components.

c.

Identify and describe common wireless modes and the importan
ce of the SSID.

d.

Describe wireless channels and their purpose.

3.

Describe wireless security issues and mitigation strategies.

a.

Describe the external wireless LAN attacker
s

and how they attack.

b.

Describe the issue of an internal attack and why a wireless LAN i
s susceptible.

c.

Describe authentication and its purpose.

d.

Describe encryption and its purpose on a wireless network.

e.

Describe traffic filtering and its purpose.


Developed May 2007

Networking Basics


Page
7

f.

Describe the step necessary to secure an access point.

4.

Configure an integrated wireless acces
s point and wireless client.

a.

Plan for a wireless implementation.

b.

Configure an integrated wireless access point using security best practices.

c.

Configure a wireless client.

d.

Describe backup and restore configuration options and their purpose.

e.

Identify curr
ent version of firmware and describe how to update the firmware.


Unit Eight

Basic Security


1.

Identify and describe the various networking threats.

a.

Describe major risks of network intrusion.

b.

Define the sources of network intrusion.

c.

Describe social engine
ering and phishing.

2.

Describe the methods of attack.

a.

Describe virus, worms, and Trojan horses.

b.

Describe DO
S and

brute f
orce attacks.

c.

Describe spyware, tracking cookies, adware
,

and pop
-
ups.

d.

Describe spam.

3.

Describe the different security applications.

a.

Define common security procedures.

b.

Describe how updates and patches relate to security issues.

c.

Describe anti
-
virus software.

d.

Describe anti
-
spyware software.

e.

Describe firewall applications.

f.

Install and update security application software.

4.

Describe a
ttack mitigation strategies.

a.

Describe how a firewall is used to protect against an attack.

b.

Describe how to protect against spam.

c.

Describe how to protect against viruses, worms, and Trojan horses.

d.

Describe security best practices.

e.

Describe a virus hoax

and the importance of an incident report.


Unit Nine

Troubleshooting Your Network


1.

Describe the troubleshooting process.

a.

Identify and describe troubleshooting methodology.

b.

Describe approaches to troubleshooting.

c.

Describe troubleshooting best practices
.

d.

Describe the need for documentation.

2.

Identify and describe common hardware issues.

a.

Describe common physical problems and how they are detected.

b.

Describe the purpose of LED indicators and their meaning.

c.

Describe cabling and connection issues.


Developed May 2007

Networking Basics


Page
8

3.

Describ
e how software utilities are used to verify TCP/IP connectivity.

a.

Identify and describe software utilities for troubleshooting
.


b.

Describe and use ipconfig.

c.

Describe and use ping.

d.

Describe and use tracert.

e.

Describe and use netstat.

f.

Describe and use nsloo
kup.

4.

Describe common wireless problems.

a.

Describe wireless troubleshooting best practices.

b.

Identify and describe radio issues with a wireless network.

c.

Identify and describe association and authentication issues within a wireless
network.

5.

Verify and trou
bleshoot

ISR connectivity.

a.

Describe how to examine the connectivity between the
router and ISP.

b.

Describe ho
w to examine the DHCP bindings.

6.

Interact with the ISP helpdesk.

a.

Describe common sources of help and the role of a

helpdesk.

b.

Describe how to gather i
nform
ation about a problem.

c.

Describe how to interact with the helpdesk.

7.

Utilize the troubleshooting process to ide
ntify and solve common problems

(s
imul
ations should be made available).




Developed May 2007

Networking Basics


Page
9

ACRONYMS



Acronym

S
pelled Out


AC

alternating current

ACK

ack
nowledgement of message

ACL

access control list

ACPI

advanced configuration and power interface

ACT

activity

ADSL

asymmetrical digital subscriber line

AGP

accelerated graphics port

AMD

advanced micro devices

AMR

audio modem riser

APIPA

automatic pri
vate internet protocol addressing

APM

advanced power management

ARP

address resolution protocol

ASR

automated system recovery

AT

advanced technology

ATA

advanced technology attachment

ATAPI

advanced technology attachment packet interface

ATM

asynchr
onous transfer mode

ATX

advanced technology extended

BIOS

basic input/output system

BNC

Bayonet
-
Neill
-
Concelman or British Navel Connector

BRI

basic rate interface

BTX

balanced technology extended

CCD

charged coupled device

CD

compact disc

CDP

Cisco

discovery protocol

CD
-
ROM

compact disc
-
read
-
only memory

CD
-
RW

compact disc
-
rewritable

CDFS

compact disc file system

CLI

command line interface

CMOS

complementary metal
-
oxide semiconductor

CNR

communication network riser

COM1

communication port 1

CPU


central processing unit

CRIMM

continuity
-
rambus inline memory module

CRT

cathode
-
ray tube

DAC

discretionary access control

DB
-
25

serial communications D
-
shell connector, 25 pins

DB
-
9

9 pin D shell connector

DC

direct current

DDOS

distributed denia
l of service

DDR

double data
-
rate


Developed May 2007

Networking Basics


Page
10

DDR RAM


double data
-
rate random access memory

DDR SDRAM


double data
-
rate synchronous dynamic random access
memory

DFS

distributed file system

DHCP

dynamic host configuration protocol

DIMM

dual inline memory module

DI
N

Deutsche Industrie Norm

DIP

dual inline package

DLT

digital linear tape

DLP

digital light processing

DMA

direct memory access

DNS

domain name service or domain name server

DOS

disk operating system or denial of service

DPMS

display power manageme
nt signaling

DRAM

dynamic random access memory

DSL

digital subscriber line

DVD

digital video disc or digital versatile disc

DVD
-
RAM

digital video disc
-
random access memory

DVD
-
ROM

digital video disc
-
read only memory

DVD
-
R

digital video disc
-
recordabl
e

DVD
-
RW

digital video disc
-
rewritable

DVI

digital visual interface

ECC

error correction code

ECP

extended capabilities port

EEPROM

electrically erasable programmable read
-
only memory

EFS

encrypting file system

EGP

exterior gateway protocol

EIDE

enh
anced integrated drive electronics

EISA

extended industry standard architecture

EMI

electromagnetic interference

EMP

electromagnetic pulse

EPROM

erasable programmable read
-
only memory

EPP

enhanced parallel port

ERD

emergency repair disk

ESD

electros
tatic discharge

ESDI

enhanced small device interface

EVGA

extended video graphics adapter/array

EVDO

evolution data optimized or evolution data only

FAT

file allocation table

FAT12

12
-
bit file allocation table

FAT16

16
-
bit file allocation table

FAT32


32
-
bit file allocation table

FDD

floppy disk drive

FERPA

Family Educational Rights and Privacy Act

Fn

Function (referring to the function key on a laptop)

FPM

fast page
-
mode


Developed May 2007

Networking Basics


Page
11

FRU

field replaceable unit

FTP

file transfer protocol

FQDN

fully qualifie
d domain name

GB

gigabyte

GDI

graphics device interface

GHz

gigahertz

GUI

graphical user interface

GPRS

general packet radio system

GSM

global system for mobile communications

HAL

hardware abstraction layer

HCL

hardware compatibility list

HDD

hard
disk drive

HDMi

high definition media interface

HPFS

high performance file system

HTML

hypertext markup language

HTTP

hypertext transfer protocol

HTTPS

hypertext transfer protocol over secure sockets layer

I/O

input/output

ICMP

internet control mess
age protocol

ICS

internet connection sharing

ICR

intelligent character recognition

IDE

integrated drive electronics

IDS

intrusion detection system

IEEE

Institute of Electrical and Electronics Engineers

IGP

interior gateway protocol

IGRP

interior gatewa
y routing protocol

IIS

Internet Information Services

IMAP

internet mail access protocol

IOS

Internet operating system

IP

internet protocol

IPCONFIG

internet protocol configuration

IPP

internet printing protocol

IPSEC

internet protocol security

IPX

i
nternetwork packet exchange

IPX/SPX

internetwork packet exchange/sequenced packet exchange

IR

infrared

IrDA

Infrared Data Association

IRQ

interrupt request

ISA

industry standard architecture

ISDN

integrated services digital network

ISO

Industry Stan
dards Organization

ISP

internet service provider

KB

kilobyte

LAN

local area network

LBA

logical block addressing

LC

Lucent connector


Developed May 2007

Networking Basics


Page
12

LCD

liquid crystal display

LDAP

lightweight directory access protocol

LED

light emitting diode

LIP or LiPoly

lithi
um
-
ion polymer

Li
-
on

lithium
-
ion

LPD/LPR

line printer daemon / line printer remote

LPT

line printer terminal

LPT1

line printer terminal 1

LPX

low profile extended

LVD

low voltage differential

MAC

media access control

MAN

metropolitan area network

M
API

messaging application programming interface

Mb

megabit

MB

megabyte

MBR

master boot record

MBSA

Microsoft Baseline Security Analyzer

MCR

multivariant curve resolution

MFD

multi
-
function device

MFP

multi
-
function product

MHz

megahertz

MicroDIMM

micro dual inline memory module

MIDI

musical instrument digital interface

MIME

multipurpose internet mail extension

MLI

multiple link interface

MMC

Microsoft management console

MMX

multimedia extensions

MOTD

message of the day

MP3

Moving Picture Exp
erts Group Layer 3 Audio

MPEG

Moving Picture Experts Group

MSCONFIG

Microsoft configuration

MSDS

material safety data sheet

MUI

multilingual user interface

NAS

network
-
attached storage

NAT

network address translation

NetBIOS

networked basic input/ou
tput system

NetBEUI

networked basic input/output system extended user interface

NFS

network file system

NIC

network interface card

NiCd

nickel cadmium

NiMH

nickel metal hydride

NLI

not logged in or natural language interface

NLX

new low
-
profile exte
nded

NNTP

network news transfer protocol

NTFS

new technology file system

NTLDR

new technology loader


Developed May 2007

Networking Basics


Page
13

NWLINK

Netware Link

OCR

optical character recognition

OEM

original equipment manufacturer

OMR

optical mark recognition

OS

operating system

OSI

oper
ating system interconnection

OSR

original equipment manufacturer service release

PAN

personal area network

PATA

parallel advanced technology attachment

PC

personal computer

PCI

peripheral component interconnect

PCIe

peripheral component interconnect
express

PCIX

peripheral component interconnect extended

PCL

printer control language

PCMCIA

Personal Computer Memory Card International Association

PDA

personal digital assistant

PGA

pin grid array

PGA2

pin grid array 2

PIN

personal identification n
umber

PKI

public key infrastructure

PnP

plug and play

POP

post office protocol

POP3

post office protocol 3

POST

power
-
on self test

POTS

plain old telephone service

PPP

point
-
to
-
point protocol

PPTP

point
-
to
-
point tunneling protocol

PRI

primary rate

interface

PROM

programmable read
-
only memory

PS/2

Personal System/2 connector

PSTN

public switched telephone network

PVC

permanent virtual circuit

PXE

preboot execution environment

QoS

quality of service

RAID

redundant array of independent (or inex
pensive) discs

RAM

random access memory

RAS

remote access service

RBAC

role
-
based access control or rule
-
based access control

RDRAM

RAMBUS® dynamic random access memory

RF

radio frequency

RFI

radio frequency interference

RGB

red green blue

RIMM

RAM
BUS® inline memory module

RIP

routing information protocol

RIS

remote installation service

RISC

reduced instruction set computer


Developed May 2007

Networking Basics


Page
14

RJ

registered jack

RJ
-
11

registered jack function 11

RJ
-
45

registered jack function 45

RMA

returned materials authorizat
ion

ROM

read only memory

RS
-
232 or RS
-
232C

recommended standard 232

RTC

real
-
time clock

SAN

storage area network

SATA

serial advanced technology attachment

SC

subscription channel

SCSI

small computer system interface

SCSI ID

small computer system i
nterface identifier

SD

card secure digital card

SDRAM

synchronous dynamic random access memory

SEC

single edge connector

SFC

system file checker

SGRAM

synchronous graphics random access memory

SIMM

single inline memory module

SLI

scalable link inter
face or system level integration or scanline
interleave mode

SMB

server message block or small to midsize business

SMTP

simple mail transport protocol

SNMP

simple network management protocol

SoDIMM


small outline dual inline memory module

SOHO

small of
fice/home office

SP

service pack

SP1

service pack 1

SP2

service pack 2

SPDIF

Sony
-
Philips digital interface format

SPGA

staggered pin grid array

SPX

sequenced package exchange

SRAM

static random access memory

SSH

secure shell

SSID

service set iden
tifier

SSL

secure sockets layer

ST

straight tip

STP

shielded twisted pair

SVGA

super video graphics array

SXGA

super extended graphics array

TB

terabyte

TCP

transmission control protocol

TCP/IP

transmission control protocol/internet protocol

TDR

ti
me domain reflectometer

TFTP

trivial file transfer protocol

UART

universal asynchronous receiver transmitter


Developed May 2007

Networking Basics


Page
15

UDF

user defined functions or universal disk format or universal
data format

UDMA

ultra direct memory access

UDP

user datagram protocol

UL

Un
derwriter’s Laboratory

UNC


universal naming convention

UPS

uninterruptible power supply

URL

uniform resource locator

USB

universal serial bus

USMT

user state migration tool

UTP

unshielded twisted pair

UXGA

ultra extended graphics array

VESA

Video E
lectronics Standards Association

VFAT

virtual file allocation table

VGA

video graphics array

VoIP

voice over internet protocol

VPN

virtual private network

VRAM

video random access memory

WAN

wide area network

WAP

wireless application protocol

WEP

w
ired equivalent privacy

WIFI

wireless fidelity

WINS

windows internet name service

WLAN

wireless local area network

WPA

wireless protected access

WUXGA

wide ultra extended graphics array

XGA

extended graphics array

ZIF

zero
-
insertion
-
force

ZIP

zigza
g inline package