ZeePedia

Glossary

<< Appendix E: Solar Dimensioning:General Data, Component Characteristics
Glossar y
0-9
A d d re s s R e s o l u t i o n P ro t o c o l
802.11.While802.11 is a wireless
(ARP).A protocolwidely used on
protocol in its own right, 802.11 is
Ethernetnetworks to translate IP
oftenused to refer to a family of wire-
addressesinto MAC addresses.
lessnetworking protocolsused
mainlyfor local areanetworking.
addressspace. A group of IP ad-
Threepopular variantsinclude
dressesthat all reside withinthe
802.11b, 802.11g, and 802.11a. See
also:Wi-Fi.
samelogical subnet.
advertisedwindow. Theportion of
a TCP header thatspecifies how
A
manyadditional bytes of datathe
receiver is prepared to accept.
AC seeAlternatingCurrent
AlternatingCurrent (AC). An elec-
tricalcurrent which varies overtime
accesspoint (AP). A devicethat
in a cyclic manner. AC current is
creates a wireless network that is
typicallyused for lighting andappli-
usuallyconnected to a wired
ances.See also: DirectCurrent
Ethernetnetwork. See also:CPE,
mastermode
amortization.An accountingtech-
niqueused to manage theexpected
accumulator.Anothername for a
cost of replacement andobsoles-
battery.
cence of equipment overtime.
ad-hocmode. A radiomode used
amplifier.A deviceused to increase
by 802.11 devices that allowsthe
thetransmitted power of a wireless
creation of a network without an ac-
device.
cesspoint.  Mesh networksoften
useradios in ad-hoc mode.See
amplitude. Thedistance from the
also:managedmode, master
center of a wave to the extreme of
mode,monitor mode
one of its peaks.
389
390
Glossary
anchorclients. Businessclients of
coordinates,logarithmic polar
coordinates
a subscription system who arereli-
ableand can be consideredlow-risk.
AP seeAccessPoint
ANDlogic. A logicaloperation that
applicationlayer. Thetopmost
onlyevaluates as true if all of the
itemsbeing compared alsoevaluate
layer in the OSI and TCP/IPnetwork
as true. See also:OR logic.
models.
anonymizingproxy. A networkserv-
ArgusseeAuditRecord Generation
andUtilization System
icethat hides the source or destina-
tion of communications. Anonymizing
ARPseeAddressResolution
proxiescan be used to protectpeo-
Protocol
ple'sprivacy and to reduce an or-
ganization'sexposure to legalliability
associated.An 802.11radio is as-
forthe actions of itsusers.
sociated to an access point when it is
anonymity.In computernetworks,
ready to communicate with the net-
communicationsthat cannot be
work.This means that it is tuned to
linked to a unique individualare
theproper channel, in range of the
said to be anonymous. Thetrade-
AP,using the correct SSIDand other
off of anonymity versusaccount-
authenticationparameters, etc.
ability in communications is an on-
at.A Unixfacility that allowstimed,
goingdebate online, andrules
aboutanonymous communications
one-shotexecution of programs.
Seealso: cron
varywidely around the world.See
also:authenticated
attenuation.Thereduction of avail-
antennadiversity.
A technique
ableradio power as it is absorbed
used to overcome multipathinterfer-
along a path, such as throughtrees,
ence by using two or morephysi-
walls,buildings, or other objects.See
also:freespace loss,scattering
callyseparated receivingantennas.
antennagain. Theamount of
AuditRecord Generationand
UtilizationSystem (Argus). An
powerconcentrated in thedirection
of strongest radiation of an antenna,
opensource network monitoringtool
usuallyexpressed in dBi.Antenna
usedfor tracking flowsbetween
gain is reciprocal, which meansthat
hosts.Argus is availablefrom
http://www.qosient.com/argus.
theeffect of gain is presentwhen
transmitting as well as receiving.
authenticated.A networkuser that
antennapattern. A graphthat de-
hasproven their identity to a service
scribesthe relative strength of a
or device (such as an accesspoint)
radiatedfield in various directions
beyond a shadow of a doubt,usually
from an antenna. See also:rectan-
by some means of cryptography.
gularplot, polar plot, linearpolar
Seealso: anonymity
Glossary
391
azimuth.Theangle that measures
connectorsare typically found on
10base2coaxial Ethernet.
deviationwith respect to the south in
thenorthern hemisphere, andwith
bridge.A networkdevice that con-
respect to the north in thesouthern
hemisphere.See also: inclination
nectstwo networks together at the
data link layer.
Bridges do not
routepackets at the networklayer.
B
Theysimply repeat packetsbetween
twolink-localnetworks.See also:
routerandtransparentbridging
bandwidth.
A measure of fre-
firewall.
quencyranges, typically usedfor
digitalcommunications.  Theword
bridge-utils.A Linuxsoftware
bandwidth is also commonly used
interchangeablywith capacityto
packagethat is required forcreat-
ing802.1d Ethernetbridges.
refer to the theoreticalmaximum
http://bridge.sourceforge.net/
datarate of a digitalcommunica-
tionsline. See also:capacity,
BroadbandGlobal AccessNet-
channel,throughput
work(BGAN). One of several stan-
battery.A deviceused to store en-
dardsused for satellite Internetac-
Seealso: DigitalVideo
cess.
ergy in a photovoltaic system.See
Broadcast(DVB-S) andVerySmall
also:solarpanel, regulator,load,
ApertureTerminal (VSAT).
converter,inverter
broadcastaddress. On IP net-
beamwidth.Theangular distance
works,the broadcast IP address is
betweenthe points on either side of
used to send data to all hosts in the
themain lobe of an antenna,where
localsubnet. On Ethernetnetworks,
thereceived power is half that of the
thebroadcast MAC address is used
mainlobe. The beamwidth of an
to send data to all machines in the
antenna is usually stated forboth
samecollision domain.
thehorizontal and verticalplanes.
bypassdiodes. A featurefound on
benchmarking.Testingthe maxi-
somesolar panels that preventsthe
mumperformance of a service or
formation of hot-spotson shaded
device.  Benchmarking a network
cells,but reduces themaximum
connectiontypically involves flood-
voltage of the panel.
ingthe link withtraffic andmeasur-
ingthe actual observedthroughput,
C
both on transmit andreceive.
BGANseeBroadbandGlobal Ac-
cessNetwork
CA seeCertificateAuthority
BNCconnector.  A coaxial cable
Cacti (http://www.cacti.net/).   A
connectorthat uses a "quick-
popularweb-based monitoringtool
connect"style bayonet lug.BNC
written in PHP.
392
Glossary
capacity.Thetheoretical maximum
can be specified as /24 in CIDR no-
amount of traffic provided by a digi-
tation.
talcommunications line. Oftenused
interchangeablywith bandwidth.
circular polarization. An electro-
magneticfieldwhere the electric
captiveportal. A mechanismused
fieldvector appears to be rotating
to transparently redirect webbrows-
withcircular motion about thedirec-
ers to a new location. Captivepor-
tion of propagation, making onefull
talsare often used forauthentication
turnfor each RF cycle. Seealso:
horizontalpolarization, vertical
or for interrupting a user'sonline
polarization
session(for example, to display an
AcceptableUse Policy).
Class A, B, and C networks. For
cell.Solarpanels are made up of
sometime, IP address spacewas
severalindividual cells, whichare
allocated in blocks of threedifferent
electricallyconnected to provide a
sizes.  These were Class A (about
particularvalue of current andvolt-
16 million addresses), Class B
age.Batteries are also made up of
(about 65 thousand addresses),and
individualcells connected in series,
Class C (255 addresses).
While
each of which contributes about 2
CIDRhas replaced class-basedal-
volts to the battery.
location,these classes are oftenstill
referred to and used internally in
CertificateAuthority. A trusteden-
organizationsusing private address
space.See also: CIDRnotation.
titythat issues signedcryptographic
keys.See also: PublicKey Infra-
ClasslessInter-Domain Routing.
structure,SSL
CIDRwas developed to improve
channelcapacity. Themaximum
routingefficiency on theInternet
backbone by enabling routeaggrega-
amount of information that can be
tionand network masks of arbitrary
sentusing a given bandwidth.See
also:bandwidth,throughput,
size.  CIDR replaces the oldclass-
datarate
basedaddressing scheme.
See
also:Class A, B, and C networks.
channel.A well definedrange of
client.An 802.11radio card in
frequenciesused for communica-
managedmode. Wirelessclients
tions.802.11 channels use 22 MHz
willjoin a network created by an
of bandwidth, but are onlyseparated
by 5 MHz. See also:Appendix B.
accesspoint, andautomatically
changethe channel to match it.See
CIDRseeClasslessInter-Domain
also:accesspoint, mesh
Routing
closednetwork. An accesspoint
CIDRnotation. A methodused to
thatdoes not broadcast itsSSID,
define a network mask by specifying
oftenused as a securitymeasure.
thenumber of bits present. Forex-
ample,the netmask255.255.255.0
Glossary
393
coax.A round(coaxial) cable with a
controls.In NEC2, controls define
centerwire surrounded by a dielec-
the RF source in an antennamodel.
Seealso: structure
tric,outer conductor, and toughinsu-
latingjacket. Antenna cablesare
converter.A deviceused to convert
usuallymade of coax. Coax is short
for"of common axis".
DC signals into a different DC or AC
voltage.See also: inverter
collision.On an Ethernetnetwork, a
CPE seeCustomerPremises
collisionoccurs when twodevices
Equipment
connected to the same physical
segmentattempt to transmit at the
cron.
sametime. When collisions arede-
A Unix facility thatallows
tected,devices delayretransmission
timedand repeated execution of
programs.See also: at
for a brief, randomly selectedperiod.
conductor.A materialthat easily
CustomerPremises Equipment.
allowselectric or thermal energy to
Networkequipment (such as a
routeror bridge) that is installed at
flowthrough without muchresis-
tance.See also: dielectric,insulator
a customer's location.
connectionlessprotocol. A network
D
protocol(such as UDP) thatrequires
no session initiation or maintenance.
Connectionlessprotocols typically
data link layer. Thesecond layer in
requireless overhead thansession
boththe OSI and TCP/IPnetwork
orientedprotocols, but do notusually
models.
Communications at this
offer data protection or packet reas-
layerhappen directlybetween
sembly.See also: sessionoriented
nodes.   On Ethernet networks,this
protocol.
is also sometimes called theMAC
layer.
consistentplatform. Maintenance
costscan be reduced by using a
datarate. Thespeed at which
consistentplatform, with thesame
802.11radios exchangesymbols,
hardware,software, and firmware
which is always higher thanthe
formany components in a network.
availablethroughput. Forexample,
thenominal data rate of 802.11g is
constructiveinterference. When
54 Mbps, while the maximum
twoidentical waves merge andare
throughput is about 20 Mbps).See
in phase, the amplitude of theresult-
also:throughput
ingwave is twice that of either of the
components.This is calledconstruc-
dB seedecibel
tiveinterference. See also:destruc-
tiveinterference
DC seeDirectCurrent
DC/ACConverter. A devicethat
converts DC power into AC power,
394
Glossary
DHCPseeDynamicHost Configu-
suitablefor use with manyappli-
ances.Also known as an inverter.
rationProtocol
DC/DCConverter. A devicethat
dielectric.A non-conductive mate-
changesthe voltage of a DC power
rialthat separates conductingwires
source.See also: linearconver-
inside a cable.
sion,switching conversion
DigitalElevation Map (DEM). Data
decibel(dB). A logarithmicunit of
thatrepresents the height of terrain
measurementthat expresses the
for a given geographic area.These
magnitude of power relative to a
mapsare used by programs such as
RadioMobile to modelelectromag-
referencelevel. Commonly used
unitsare dBi (decibels relative to an
neticpropagation.
isotropicradiator) and dBm(deci-
DigitalVideo Broadcast(DVB-S).
belsrelative to a milliwatt).
One of several standards usedfor
defaultgateway.  When a router
satelliteInternet access. Seealso:
BroadbandGlobal AccessNet-
receives a packet destined for a
work(BGAN) andVerySmall Ap-
networkfor which it has no explicit
ertureTerminal (VSAT).
route,the packet is forwarded to the
defaultgateway.  The defaultgate-
dipoleantenna. Thesimplest form
waythen repeats the process,pos-
of omnidirectionalantenna.
siblysending the packet to itsown
defaultgateway, until thepacket
DirectCurrent (DC). An electrical
reachesits ultimatedestination.
currentwhich remains constantover
defaultroute. A networkroute that
time. DC current is typically usedfor
points to the defaultgateway.
networkequipment, such as access
pointsand routers. See also:Alter-
Denial of Service (DoS). An attack
natingCurrent
on network resources,usually
DirectSequence SpreadSpec-
achieved by flooding a network with
trum(DSSS). Theradio modulation
traffic or exploiting a bug in an appli-
cation or network protocol.
schemeused by 802.11b.
depreciation.An accounting
directionalantenna. An antenna
methodused to save money to
thatradiates very strongly in a par-
coverthe eventual break down of
ticulardirection. Examples of direc-
equipment.
tionalantennas include theyagi,
dish,and waveguide antennas.See
destructiveinterference. When
also:omnidirectionalantenna,
sectorialantenna
twoidentical waves merge andare
exactlyout of phase, theamplitude
directivity.Theability of an antenna
of the resulting wave is zero.This is
calleddestructive interference.See
to focus energy in a particulardirec-
also:constructiveinterference
tionwhen transmitting, or to receive
Glossary
395
edge.Theplace where oneorgani-
energyfrom a particulardirection
whenreceiving.
zation'snetwork meetsanother.
Edgesare defined by the location of
diversityseeantennadiversity
theexternal router, whichoften acts
as a firewall.
DNSseeDomainName Service
electromagneticspectrum. The
DNScaching. By installing a DNS
verywide range of possiblefre-
server on your local LAN, DNSre-
quencies of electromagnetic energy.
questsfor an entire network may be
Parts of the electromagneticspec-
cachedlocally, improvingresponse
truminclude radio, microwave,visi-
times.This technique is calledDNS
blelight, and X rays.
caching.
electromagneticwave. A wavethat
dnsmasq.An opensource caching
propagatesthrough space without
DNSand DHCP server,available
theneed for a propagatingmedium.
fromhttp://thekelleys.org.uk/
It contains an electric and a mag-
neticcomponent. See also:me-
DomainName Service (DNS).The
chanicalwave
widelyused network protocolthat
elevationseeinclination
maps IP addresses to names.
dominantmode. Thelowest fre-
endspan injectors. An 802.3af
Powerover Ethernet devicethat
quencythat can be transmitted by a
waveguide of a given size.
providespower via the Ethernetca-
ble. An Ethernet switch thatprovides
DoSseeDenial of Service
power on each port is an example of
an end span injector. Seealso: mid
DSSS see DirectSequence
spaninjectors
SpreadSpectrum
end-to-endencryption. An en-
DVB-SseeDigitalVideo Broadcast.
cryptedconnection negotiated by
bothends of a communicationsses-
DynamicHost ConfigurationPro-
sion.End-to-end encryptioncan
tocol(DHCP). A protocolused by
providestronger protection thanlink
layerencryption whenused on
hosts to automatically determine
their IP address.
untrustednetworks (such as the
Internet).
E
EtherApe.An opensource network
visualizationtool.
Available at
http://etherape.sourceforge.net/
eavesdropper.Someonewho inter-
ceptsnetwork data such as pass-
EtherealseeWireshark.
words,email, voice data, or online
chat.
396
Glossary
ExtendedService Set Identifier
ingloops need to be resolvedfor
(ESSID).Thename used to identify
propernetwork operations.
an 802.11 network. Seealso:
closednetwork
freespace loss. Powerdiminished
by geometric spreading of thewave-
externaltraffic. Networktraffic that
front, as the wavepropagates
throughspace. See also:attenua-
originatesfrom, or is destined for, an
tion,free space loss, Appendix C
IP address outside yourinternal
network,such as Internet traffic.
frequency.Thenumber of whole
F
wavesthat pass a fixedpoint in a
period of time. See also:wave-
length,Hertz
firestarter.A graphicalfront-end for
front-to-backratio. Theratio of the
configuringLinux firewallsavailable
maximumdirectivityof an antenna
fromhttp://www.fs-security.com/.
to its directivity in theopposite direc-
tion.
filter.Thedefault table used in the
Linuxnetfilterfirewallsystem is the
fullduplex. Communications
filtertable.  This table is used for
equipmentthat can send andre-
determiningtraffic thatshould be
ceive at the same time (such as a
accepted or denied.
telephone).See also: halfduplex
firewall. A routerthat accepts or
fwbuilder.A graphicaltool that lets
deniestraffic based on some crite-
youcreate iptablesscripts on a
ria.  Firewalls are onebasic tool
machineseparate from yourserver,
used to protect entire networksfrom
andthen transfer them to theserver
undesirabletraffic.
later.http://www.fwbuilder.org/
flush. To remove all entries in a
G
routingtable or netfilterchain.
forwarding.Whenrouters receive
gain.Theability of a radiocompo-
packetsthat are destined for a dif-
ferenthost or network, they sendthe
nent(such as an antenna or ampli-
packet to the next router closest to
fier) to increase the power of a sig-
nal.See also: decibel
itsultimate destination. Thisprocess
is called forwarding.
gaintransfer. Comparing an an-
forwardingloops.  A routing mis-
tennaunder test against a known
configurationwhere packets are
standardantenna, which has a cali-
forwardedcyclically between two or
bratedgain.
morerouters. Catastrophicnetwork
gasification.Theproduction bub-
failure is prevented by using theTTL
value on every packet, butforward-
bles of oxygen and hydrogenthat
Glossary
397
occurswhen a battery is over-
zontaldirection. See also:circular
charged.
polarization,vertical polarization
globallyroutable. An addressis-
hot-spot.In wirelessnetworks, a
sued by an ISP or RIR that is reach-
hot-spot is a location thatprovides
Internetaccess via Wi-Fi, typically
ablefrom any point on theInternet.
by use of a captiveportal. In pho-
In IPv4, there areapproximately four
tovoltaicsystems, a hot-spotoc-
billionpossible IP addresses,al-
curswhen a single cellin a solar
thoughnot all of these areglobally
panelis shaded,causing it to act as
routable.
a resistive load rather than to gen-
H
eratepower.
hub.An Ethernetnetworking device
half duplex. Communications equip-
thatrepeats received data on all
connectedports. See also:switch.
ment that can send or receive, but
never both at once (such as a hand-
Huygensprinciple. A wavemodel
heldradio). See also:full duplex.
thatproposes an infinitenumber of
Heliax.Highquality coaxial cable
potentialwavefronts alongevery
point of an advancing wavefront.
thathas a solid or tubularcenter
conductorwith a corrugatedsolid
Hz seeHertz
outerconductor which enables it to
flex.See also: coax
I
Hertz(Hz). A measure of fre-
quency, denotingsome number of
IANAseeInternetAssigned Num-
cyclesper second.
bersAuthority
HF (High-Frequency).
Radio
ICMPseeInternetControl Mes-
wavesfrom 3 to 30 MHz arere-
sageProtocol
ferred to as HF. Data networkscan
be built on HF that operate at very
ICPseeInter-CacheProtocol
longrange, but with verylow data
capacity.
impedance.Thequotient of voltage
hop.Datathat crosses onenetwork
overcurrent of a transmissionline,
connection.   A web server may be
consisting of a resistance and a re-
severalhops away from yourlocal
actance.The load impedancemust
computer, as packets areforwarded
matchthe source impedancefor
fromrouter to router,eventually
maximumpower transfer (50  for
reachingtheir ultimatedestination.
mostcommunications equipment).
horizontalpolarization. An elec-
inboundtraffic. Networkpackets
tromagneticfieldwith the electric
thatoriginate from outside thelocal
componentmoving in a linearhori-
network(typically the Internet)and
398
Glossary
IntrusionDetection System(IDS).
arebound for a destinationinside
thelocal network.  Seealso: out-
A program that watchesnetwork
boundtraffic.
traffic, looking for suspicious data or
behaviorpatterns.
An IDS may
inclination. Theangle that marks
make a log entry, notify a network
deviationfrom a horizontalplane.
administrator, or take direct action in
Seealso: azimuth
response to undesirable traffic.
infrastructuremode seemaster
inverterseeDC/ACConverter
mode
IP seeInternetProtocol
insulatorseedielectric
iproute2.
Theadvanced routing
Inter-CacheProtocol (ICP). A high
toolspackage for Linux, usedfor
traffic shaping and otheradvanced
performanceprotocol used to com-
techniques.
Available from
municatebetween web caches.
http://linux-net.osdl.org/
Internet Assigned Numbers
iptables.
Authority(IANA). Theorganization
Theprimary command
used to manipulate netfilterfirewall
thatadministers various criticalparts
rules.
of Internet infrastructure,including
IP address allocation, DNSroot
irradiance.Thetotal amount of so-
nameservers, and protocolservice
larenergy that lights a givenarea, in
numbers.
W/m2
InternetControl MessageProto-
ISM band. ISM is short for Indus-
col(ICMP). A NetworkLayer proto-
trial,Scientific, andMedical.  The
colused to inform nodes aboutthe
ISMband is a set of radiofrequen-
state of the network. ICMP is part of
ciesset aside by the ITUfor unli-
theInternet protocolsuite.
See
also:Internetprotocol suite.
censeduse.
Internetlayer seenetworklayer
isotropicantenna.  A hypothetical
antennathat evenlydistributes
InternetProtocol (IP). The mostcom-
power in all directions,approximated
monnetwork layer protocol in use. IP
by a dipole.
defines the hosts and networks that
IV characteristic curve. A graph
make up the global Internet.
thatrepresents the current that is
Internetprotocol suite(TCP/IP).
providedbased on the voltagegen-
eratedfor a certain solarradiation.
Thefamily of communicationproto-
colsthat make up theInternet.
Some of these protocolsinclude
TCP,IP, ICMP, andUDP.
Also
calledthe TCP/IPprotocol suite, or
simplyTCP/IP.
Glossary
399
Line of Sight (LOS). If a person
K
standing at point A has an unob-
structedview of point B, then point A
is said to have a clear Line of Sight
knetfilter.A graphicalfront-end for
to point B.
configuringLinux firewalls.Available
fromhttp://venom.oltrelinux.com/
linearpolar coordinates. A graph
systemwith equally spaced,gradu-
knowngood. In troubleshooting, a
atedconcentric circlesrepresenting
knowngood is any componentthat
an absolute value on a polarprojec-
can be substituted to verify thatits
tion.Such graphs are typicallyused
counterpart is in good, working
to represent antenna radiationpat-
condition.
terns.See also: logarithmicpolar
coordinates
L
linearconversion.  A DC voltage
conversionmethod that lowersthe
lag.Commonterm used to describe
voltage by converting excessenergy
a network with highlatency.
to heat. See also:switchingcon-
version
lambda ( ) seewavelength
linearpolarization. An electro-
LANseeLocalArea Network
magneticwave wherethe electric
fieldvector stays in the sameplane
latency.Theamount of time it takes
allthe time. The electricfieldmay
for a packet to cross a networkcon-
leavethe antenna in a verticalorien-
nection. It is often (incorrectly)used
tation, a horizontal orientation, or at
interchangeablywith Round Trip
someangle between the two.See
Time(RTT), since measuringthe
also:verticalpolarization, hori-
RTT of a wide-area connection is
zontalpolarization
trivialcompared to measuringthe
actuallatency. See also:Round
link budget. Theamount of radio
TripTime.
energyavailable to overcomepath
losses. If the available linkbudget
lead-acidbatteries. Batteriescon-
exceedsthe path loss,minimum
sisting of two submerged leadelec-
receivesensitivity of thereceiving
trodes in an electrolytic solution of
radio,and any obstacles,then
waterand sulfuric acid. Seealso:
communicationsshould be possible.
stationarybatteries
link layer encryption. An encrypted
leasetime. In DHCP, IP addresses
connectionbetween link-localde-
areassigned for a limitedperiod of
vices,typically a wireless clientand
time,known as the lease time.After
an accesspoint. Seealso: end-to-
thistime period expires, clientsmust
endencryption
request a new IP address fromthe
DHCPserver.
400
Glossary
link-local.Networkdevices that are
M
connected to the same physical
segmentcommunicate with each
otherdirectly are said to be link-
MAClayer seedata link layer
local. A link-local connectioncannot
cross a router boundary withoutus-
MACaddress. A unique 48 bit number
ingsome kind of encapsulation,
assigned to every networkingdevice
such as a tunnelor a VPN.
when it is manufactured. The MAC ad-
dress is used for link-localcommunica-
listen. Programsthat accept con-
tions.
nections on a TCP port are said to
MACfiltering.An accesscontrol
listen on that port.
methodbased on the MACaddress
load.Equipment in a photovoltaic
of communicating devices.
systemthat consumes energy.See
MACtable. A networkswitch must
also:battery,solar panel,regula-
tor,converter, inverter
keeptrack of the MACaddresses
used on each physical port, in order
LocalArea Network (LAN).A net-
to efficientlydistribute packets.This
information is kept in a tablecalled
work(typically Ethernet) usedwithin
theMAC table.
an organization. The part of a net-
workthat exists just behind an ISP's
maintenance-freelead-acid bat-
router is generally considered to be
teriesseelead-acidbatteries
part of the LAN. See also:WAN.
Man-In-The-Middle(MITM). A
logarithmicpolar coordinates. A
networkattack where a malicious
graphsystem withlogarithmically
userintercepts allcommunications
spaced,graduated concentriccircles
between a client and a server,allow-
representing an absolute value on a
inginformation to be copied or ma-
polarprojection. Such graphsare
nipulated.
typicallyused to representantenna
radiationpatterns. See also:linear
managedhardware.  Networking
polarcoordinates
hardwarethat provides an adminis-
longfat pipe network. A network
trativeinterface, portcounters,
SNMP, or other interactivefeatures
connection(such as VSAT) thathas
is said to be managed.
highcapacity and high latency.   In
order to achieve the bestpossible
managedmode. A radiomode
performance,TCP/IP must be tuned
used by 802.11 devices thatallows
to match the traffic on suchlinks.
theradio to join a networkcreated
by an access point. See also:mas-
LOSseeLine of Sight
termode, ad-hoc mode,monitor
mode
Glossary
401
masterbrowser.
mesh.A networkwith no hierarchi-
On Windows
networks,the master browser is the
calorganization, where everynode
computerthat keeps a list of allthe
on the network carries thetraffic of
computers,shares and printersthat
everyother as needed. Goodmesh
areavailable in NetworkNeighbor-
networkimplementations areself-
hoodor My Network Places.
healing,which means thatthey
automaticallydetect routing prob-
mastermode. A radiomode used
lemsand fix them as needed.
by 802.11 devices that allowsthe
messagetypes.  Ratherthat port
radio to create networks just as an
accesspoint does. See also:man-
numbers,ICMP traffic usesmes-
agedmode, ad-hoc mode,moni-
sagetypes to define thetype of in-
tormode
formationbeing sent.
Seealso:
ICMP.
matchcondition.
In netfilter, a
method of the worst month.A
matchcondition specifies thecriteria
thatdetermine the ultimatetarget for
methodfor calculating thedimen-
a given packet.  Packetsmay be
sions of a standalone photovoltaic
matched on MAC address,source
system so it will work in the month in
or destination IP address, portnum-
whichthe demand for energy is
ber,data contents, or just aboutany
greatestwith respect to theavailable
otherproperty.
solarenergy. It is the worstmonth of
theyear, as this month withhave the
MaximumDepth of Discharge
largestratio of demanded energy to
(DoDmax). Theamount of energy
availableenergy.
extractedfrom a battery in a single
MHF seeU.FL
dischargecycle, expressed as a
percentage.
microfinance.Theprovision of
smallloans, savings and otherbasic
MaximumPower Point (Pmax). The
financialservices to the world s
pointwhere the power supplied by a
poorestpeople.
solarpanel is at maximum.
midspan injectors. A Powerover
MC-Card.A verysmall microwave
Ethernetdeviceinserted between
connector found on Lucent / Orinoco /
an Ethernet switch and thedevice to
Avayaequipment.
be powered. See also:endspan
injectors
mechanicalwave. A wavecaused
whensome medium or object is
milliwatts(mW). A unit of power
swinging in a periodic manner.See
representingone thousandth of a
also:electromagneticwave
Watt.
MediaAccess Control layersee
MITM seeMan-In-The-Middle
data link layer
402
Glossary
MMCX.A verysmall microwave
doornetworking components,such
connectorcommonly found on
as antennas and outdooraccess
equipmentmanufactured by Senao
points.
andCisco.
Nagios(http://nagios.org/)  A real-
monitormode. A radiomode used
timemonitoring tool that logsand
by 802.11 devices not normallyused
notifies a system administrator
forcommunications that allowsthe
aboutservice and networkoutages.
radiopassively monitor radiotraffic.
Seealso: mastermode, managed
NATseeNetworkAddress Trans-
mode,ad-hoc mode
lation
monitorport.
nat.Thetable used in theLinux
On a managed
switch,one or more monitorports
netfilterfirewallsystem to configure
may be definedthat receive traffic
NetworkAddress Translation.
sent to all of the other ports.This
NEC2seeNumericalElectromag-
allowsyou to connect a traffic moni-
neticsCode
torserver to the port to observe and
analyzetraffic patterns.
NetBIOS.A sessionlayer protocol
MultiRouter Traffic Grapher
used by Windows networking for file
(MRTG).An opensource tool used
andprinter sharing. See also:SMB.
forgraphing traffic statistics.Avail-
netfilter.
ablefrom http://oss.oetiker.ch/mrtg/
Thepacket filtering
framework in modern Linuxkernels
multipath.Thephenomenon of re-
is known as netfilter.  It uses the
flections of a signal reaching their
iptablescommand to manipulate
filterrules. http://netfilter.org/
targetalong different paths,and
therefore at different times.
netmask(networkmask).  A net-
multipoint-to-multipointsee
mask is a 32-bit number thatdivides
mesh
the 16 million available IP addresses
intosmaller chunks, calledsubnets.
mW seemilliwatt
All IP networks use IP addresses in
combinationwith netmasks to logi-
My TraceRoute (mtr).  A network
callygroup hosts andnetworks.
diagnostictool used as an alterna-
NeTraMet.An opensource network
tive to the traditional traceroutepro-
gram.http://www.bitwizard.nl/mtr/.
flow analysistool available from
Seealso: traceroute/ tracert.
freshmeat.net/projects/netramet/
networkaddress.  Thelowest IP
N
number in a subnet.  Thenetwork
address is used in routing tables to
specifythe destination to be used
N connector. A sturdymicrowave
connectorcommonly found on out-
Glossary
403
NominalVoltage (VN). Theoperat-
whensending packets to a logical
group of IP addresses.
ingvoltage of a photovoltaicsystem,
typically 12 or 24 volts.
NetworkAddress Translation
(NAT).NAT is a networking technol-
ntop.A networkmonitoring tool that
ogythat allows many computers to
providesextensive detail aboutcon-
share a single, globally routable IP
nectionsand protocol use on a local
address.  While NAT can help to
areanetwork. http://www.ntop.org/
solvethe problem of limited IP ad-
dressspace, it creates a technical
null. In an antennaradiation pattern,
challengefor two-way services,
a null is a zone in which theeffective
such as Voice over IP.
radiatedpower is at a minimum.
networkdetection. Networkdiag-
nulling.A specific case of multi-
nostictools that displayinformation
pathinterferencewhere the signal
aboutwireless networks, such as
at the receiving antenna is zeroed
thenetwork name, channel,and
by the destructiveinterference of
encryptionmethod used.
reflectedsignals.
networklayer.
Alsocalled the
number of days of autonomy(N).
Internetlayer. This is the thirdlayer
Themaximum number of daysthat
of the OSI and TCP/IPnetwork
a photovoltaic system canoperate
models,where IP operates and
withoutsignificantenergy received
Internetrouting takes place.
fromthe sun.
networkmask seenetmask
NumericalElectromagnetics
Code(NEC2). A freeantenna mod-
ngrep.An opensource network se-
elingpackage that lets youbuild an
curityutility used to find patterns in
antennamodel in 3D, and thenana-
dataflows.Available for freefrom
lyzethe antenna s electromagnetic
http://ngrep.sourceforge.net/
response.http://www.nec2.org/
node.Anydevice capable of send-
O
ingand receiving data on a network.
Accesspoints, routers,computers,
andlaptops are all examples of
OFDMseeOrthogonalFrequency
nodes.
DivisionMultiplexing
NominalCapacity (CN). Themaxi-
omnidirectionalantenna. An an-
mumamount of energy that can be
tennathat radiates almost equally in
extractedfrom a fully chargedbat-
everydirection in thehorizontal
tery. It is expressed in Ampere-hours
plane.See also: directionalan-
(Ah) or Watt-hours (Wh).
tenna,sectorial antenna
404
Glossary
one-armrepeater. A wirelessre-
overdischarge.Discharging a bat-
terybeyond its MaximumDepth of
peaterthat only uses a singleradio,
Discharge, whichresults in deterio-
at significantlyreduced throughput.
Seealso: repeater
ration of the battery.
onionrouting. A privacytool (such
oversubscribe.To allowmore users
as Tor) thatrepeatedly bouncesyour
thanthe maximum availableband-
TCPconnections across a number of
widthcan support.
serversspread throughout theInter-
P
net,wrapping routing information in a
number of encrypted layers.
OR logic.  A logical operationthat
packet.On IP networks, messages
evaluates as true if any of theitems
sentbetween computers arebroken
beingcompared also evaluate as
intosmall pieces calledpackets.
true.See also: ANDlogic.
Eachpacket includes a source,des-
tination,and other routinginforma-
OrthogonalFrequency Division
tionthat is used to route it to its ulti-
Multiplexing(OFDM)
matedestination. Packets arereas-
sembledagain at the remote end by
OSInetwork model.
A popular
TCP(or another protocol)before
model of network communications
beingpassed to theapplication.
defined by the ISO/IEC 7498-1
packetfilter. A firewallthat oper-
standard.The OSI modelconsists
of seven interdependent layers,from
ates at the Internet layer by inspect-
thephysical through theapplication.
ingsource and destination IP ad-
Seealso: TCP/IPnetwork model.
dresses,port numbers, andproto-
cols.  Packets are eitherpermitted
outboundtraffic. Networkpackets
or discarded depending on the
thatoriginate from the localnetwork
packetfilterrules.
andare bound for a destinationout-
sidethe local network(typically
partition.A techniqueused by net-
somewhere on the Internet).  See
workhubs to limit the impact of
also:inboundtraffic.
computersthat transmitexcessively.
Hubswill temporarily removethe
overcharge.Thestate of a battery
abusivecomputer (partition it)from
whencharge is applied beyondthe
therest of the network, andrecon-
limit of the battery's capacity. If en-
nect it again after some time.  Ex-
ergy is applied to a batterybeyond
cessivepartitioning indicatesthe
itspoint of maximum charge,the
presence of an excessive bandwidth
electrolytebegins to break down.
consumer,such as a peer-to-peer
Regulatorswillallow a small
client or network virus.
amount of overcharge time to a bat-
tery to avoid gasification, butwill
passivePOE injector seePower
removepower before the battery is
overEthernet
damaged.
Glossary
405
pathloss. Loss of radio signal due
PKI seePublicKey Infrastructure
to the distance betweencommuni-
plomb.A heavypiece of metal bur-
catingstations.
ied in the earth to improve a ground
PeakSun Hours (PSH). Average
connection.
value of daily irradiation for a given
PoEseePowerover Ethernet
area.
photovoltaicgenerator seesolar
point-to-multipoint.A wireless
panel
networkwhere several nodescon-
nectback to a central location.The
photovoltaicsolar energy. Theuse
classicexample of a point-to-
of solar panels to collectsolar en-
multipointnetwork is an access
ergy to produce electricity. Seealso:
point at an office with several lap-
thermalsolar energy
topsusing it for Internetaccess. See
also:point-to-point,multipoint-to-
photovoltaicsystem. An energy
multipoint
systemthat generates electricalen-
point-to-point.A wirelessnetwork
ergyfrom solar radiation andstores
it for later use. A standalonephoto-
consisting of only two stations,usu-
voltaicsystem does this withoutany
allyseparated by a greatdistance.
Seealso: point-to-multipoint,
connection to an established power
grid.See also: battery,solar panel,
multipoint-to-multipoint
regulator,load, converter,inverter
Point-to-PointProtocol (PPP). A
physicallayer. Thelowest layer in
networkprotocol typically used on
boththe OSI and TCP/IPnetwork
seriallines (such as a dial-upcon-
models.  The physical layer is the
nection) to provide IP connectivity.
actualmedium used forcommunica-
polarplot. A graphwhere points are
tions,such as copper cable,optic
fiber, or radio waves.
located by projection along a rotat-
ingaxis (radius) to an intersection
pigtail.A shortmicrowave cable
withone of several concentriccir-
cles.See also: rectangularplot
thatconverts a non-standardcon-
nectorinto something morerobust
polarization.Thedirection of the
andcommonly available.
electriccomponent of an electro-
ping.A ubiquitousnetwork diagnos-
magneticwave as it leaves the
ticutility that uses ICMPecho re-
transmittingantenna. See also:
horizontalpolarization, vertical
questand reply messages to deter-
polarization, circular polarization
minethe round trip time to a network
host.  Ping can be used to deter-
polarizationmismatch. A state
minethe location of networkprob-
lems by "pinging" computers in the
where a transmitting andreceiving
pathbetween the local machineand
antenna do not use the samepolari-
theultimate destination.
zation,resulting in signalloss.
406
Glossary
policy.In netfilter,the policy is the
throughthe use of filters.Privoxy is
oftenused in conjunction withTor.
defaultaction to be taken when no
otherfilteringrules apply.  Forex-
proactiverouting. A meshimple-
ample,the default policy forany
chainmay be set to ACCEPT or
mentationwhere every nodeknows
DROP.
aboutthe existence of everyother
node in the mesh cloud as well as
portcounters. Managedswitches
whichnodes may be used to route
androuters provide statisticsfor
traffic to them. Each nodemaintains
eachnetwork port called portcount-
a routing table covering thewhole
meshcloud. See also:reactive
ers.  These statistics mayinclude
routing
inboundand outbound packetand
bytecounts, as well as errorsand
protocolanalyzer. A diagnostic
retransmissions.
programused to observe anddisas-
power.Theamount of energy in a
semblenetwork packets.  Protocol
certainamount of time.
analyzersprovide the greatestpos-
sibledetail about individualpackets.
Powerover Ethernet (PoE).A
protocolstack. A set of network
techniqueused to supply DC power
to devices using the Ethernetdata
protocolsthat provideinterdepend-
cable.See also: endspan injec-
entlayers of functionality. Seealso:
tors,mid spaninjectors
OSInetwork model andTCP/IP
networkmodel.
PPPseePoint to Point Protocol
PSHseePeakSun Hours
presentationlayer. Thesixth layer
Publickey cryptography. A form of
of the OSI networking model.This
layerdeals with datarepresentation,
encryptionused by SSL, SSH,and
such as MIME encoding or data
otherpopular securityprograms.
compression.
Publickey cryptography allowsen-
cryptedinformation to be exchanged
privateaddress space.  A set of
over an untrusted networkwithout
reserved IP addresses outlined in
theneed to distribute a secretkey.
RFC1918.Private address space is
PublicKey Infrastructure (PKI).A
frequentlyused within an organiza-
tion, in conjunction withNetwork
securitymechanism used in con-
junctionwith publickey cryptogra-
AddressTranslation (NAT).
The
phyto preventthe possibility of
reservedprivate address space
Man-In-The-Middleattacks.See
ranges include 10.0.0.0/8,
also:certificateauthority
172.16.0.0/12,and 192.168.0.0/16.
Seealso: NAT.
Privoxy(http://www.privoxy.org/). A
webproxy that providesanonymity
Glossary
407
Q
dressesare administered by the
IANA.The space has beendivided
intolarge subnets, which aredele-
gated to one of the five regional
quickblow. A type of fuse that im-
Internetregistries, each withauthor-
mediatelyblows if the current flow-
ityover a large geographicarea.
ingthrough it is higher thantheir
rating.See also: slowblow
regulator.Thecomponent of a pho-
tovoltaicsystem thatassures that
R
thebatteryis working in appropriate
conditions. It avoids overcharging
or underchargingthebattery, both
radiationpattern seeantenna
of which are very detrimental to the
pattern.
life of the battery. See also:solar
panel,battery, load,converter,
radio.Theportion of theelectro-
inverter
magneticspectrum in whichwaves
can be generated by applyingalter-
repeater.A nodethat is configured
natingcurrent to an antenna.
to rebroadcast traffic that is not des-
tinedfor the node itself,often used
reactiverouting. A meshimple-
to extend the useful range of a net-
mentationwhere routes arecom-
work.
putedonly when it is necessary to
senddata to a specific node.See
Requestfor Comments(RFC).
also:proactiverouting
RFCsare a numbered series of
documentspublished by theInternet
realtimemonitoring. A network
Societythat document ideasand
monitoringtool that performsunat-
conceptsrelated to Internettech-
tendedmonitoring over longperiods,
nologies.  Not all RFCs areactual
andnotifies administrators immedi-
standards,but many are eitherap-
atelywhen problems arise.
provedexplicitly by the IETF, or
eventuallybecome de facto stan-
reciprocity.An antenna'sability to
dards.RFCs can be viewedonline
maintainthe samecharacteristics
at http://rfc.net/.
regardless if whether it is transmit-
ting or receiving.
returnloss. A logarithmicratio
measured in dB that comparesthe
recombinantbatteries seelead-
power reflected by the antenna to
acidbatteries
thepower that is fed intothe an-
tennafrom the transmissionline.
rectangularplot. A graphwhere
Seealso: impedance
pointsare located on a simplegrid.
Seealso: polarplot
reversepolarity (RP). Proprietary
microwaveconnectors, based on a
RegionalInternet Registrars
standardconnector but withthe
(RIR).The 4 billion available IP ad-
gendersreversed. The RP-TNCis
408
Glossary
probablythe most commonreverse
forwarded.   If a router receives a
polarityconnector, but others(such
packetfor a network that is not in
as RP-SMA and RP-N) arealso
therouting table, the routeruses its
commonplace.
defaultgateway. Routers operate at
theNetwork Layer.
Seealso:
RF transmission line. Theconnec-
bridgeanddefaultgateway.
tion(typically coax, Heliax, or a
waveguide) between a radio and an
RP seeReversePolarity
antenna.
RP-TNC.A commonproprietary
RIRseeRegionalInternet Regis-
version of the TNC microwavecon-
trars
nector,with the gendersreversed.
TheRP-TNC is often found on
R o u n d Tr i p T i m e ( RT T ) . T h e
equipment manufactured by
amount of time it takes for a packet
Linksys.
to be acknowledged from theremote
RRDseeRoundRobin Database
end of a connection.
Frequently
confusedwith latency.
RRDtool.A suite of tools that allow
rogueaccess points. An unauthor-
you to create and modify RRDdata-
bases, as well as generateuseful
izedaccess point incorrectlyin-
graphs to present the data.
stalled by legitimate users, or by a
RRDtool is used to keep track of
maliciousperson who intends to
time-seriesdata (such as network
collectdata or do harm to thenet-
bandwidth,machine room tempera-
work.
ture, or server load average)and
RoundRobin Database (RRD).A
candisplay that data as an average
overtime. RRDtool is availablefrom
databasethat stores information in a
http://oss.oetiker.ch/rrdtool/
verycompact way that doesnot ex-
pandover time.  This is thedata
rsync(http://rsync.samba.org/). An
formatused by RRDtool andother
networkmonitoring tools.
opensource incremental file transfer
utilityused for maintainingmirrors.
router.
A device that forwards
RTTseeRoundTrip Time
packetsbetween differentnetworks.
Theprocess of forwardingpackets
to the next hop is calledrouting.
S
routing.Theprocess of forwarding
packetsbetween differentnetworks.
SACKseeSelectiveAcknowl-
A device that does this is called a
edgment
router.
scattering.Signalloss due to ob-
routingtable.  A list of networks
jects in the path between twonodes.
and IP addresses kept by a router to
Seealso: freespace loss,at-
determinehow packets should be
tenuation
Glossary
409
sectorialantenna. An antennathat
sharedmedium. A link-localnet-
radiatesprimarily in a specific area.
workwhere every node canobserve
Thebeam can be as wide as 180
thetraffic of everyother node.
degrees, or as narrow as 60 de-
grees.See also: directionalan-
Shorewall(http://shorewall.net/). A
tenna,omnidirectional antenna
configurationtool used for setting up
netfilterfirewallswithout the need to
SecureSockets Layer (SSL).An
learniptables syntax.
end-to-endencryption technology
sidelobes.No antenna is able to
builtinto virtually all webbrowsers.
SSLuses publickey cryptography
radiateall the energy in onepre-
and a trusted publickey infra-
ferreddirection. Some is inevitably
structureto securedata communi-
radiated in other directions.These
cations on the web. Wheneveryou
smallerpeaks are referred to as
visit a web URL that startswith
sidelobes.
https,you are usingSSL.
signalgenerator. A transmitterthat
Selective Acknowledgment (SACK).
emitscontinuously at a specific fre-
A mechanism used to overcome
quency.
TCPinefficiencies on high latency
SimpleNetwork Management
networks,such as VSAT.
Protocol  (SNMP). A protocolde-
ServerMessage Block (SMB). A
signed to facilitate the exchange of
managementinformation between
networkprotocol used in Windows
networkdevices. SNMP is typically
networks to provide file sharing
services.See also: NetBIOS.
used to poll network switchesand
routers to gather operatingstatistics.
ServiceSet ID (SSID) seeEx-
tendedService Set Identifier
site-wideweb cache.  Whileall
modernweb browsers provide a
sessionlayer. Layerfive of theOSI
localdata cache, largeorganizations
model,the Session Layermanages
canimprove efficiency by installing a
logicalconnections betweenappli-
site-wideweb cache, such as Squid.
cations.
A site-wide web cache keeps a copy
of all requests made fromwithin an
sessionoriented protocol. A net-
organization,and serves thelocal
workprotocol (such as TCP)that
copy on subsequent requests.See
also:Squid.
requiresinitialization beforedata
can be exchanged, as well as some
slowblow. A fusethat allows a cur-
clean-upafter data exchangehas
completed.Session orientedproto-
renthigher than its rating to pass for
a short time. See also:quickblow
colstypically offer errorcorrection
andpacket reassembly, whilecon-
SMA.A smallthreaded microwave
nectionlessprotocols do not. See
also:connectionlessprotocol.
connector.
410
Glossary
SMBseeServerMessage Block
shouldhave low latency andmore
thanenough capacity to carrythe
SmokePing. A latency measure-
traffic of its users. See also:band-
width, capacity, andlatency.
menttool that measures, storesand
displayslatency, latencydistribution
splithorizon DNS.  A technique
andpacket loss all on a single
graph.SmokePing is availablefrom
used to serve different answers to
http://oss.oetiker.ch/smokeping/
DNSrequests based on thesource
of the request. Split horizon is used
SNMP seeSimpleNetwork Man-
to direct internal users to a different
agementProtocol
set of servers than Internetusers.
Snort(http://www.snort.org/). A
spoof.To impersonate a network
verypopular open sourceintrusion
device,user, or service.
detectionsystem. See also:Intru-
spotcheck tools.  Networkmoni-
sionDetection System.
toringtools that are runonly when
SoCseeState of Charge
needed to diagnose a problem.
Pingand traceroute are examples of
solarmodule seesolarpanel
spotcheck tools.
Squid.A verypopular open source
solarpanel. Thecomponent of a
photovoltaicsystem used to con-
webproxy cache. It is flexible,ro-
bust,full-featured, and scales to
vertsolar radiation intoelectricity.
Seealso: battery,regulator, load,
supportnetworks of nearly anysize.
converter,inverter
http://www.squid-cache.org/
solarpanel array. A set of solar
SSIDseeExtendedService Set
panelswired in series and/or paral-
Identifier
lel in order to provide thenecessary
SSLseeSecureSockets Layer
energyfor a given load.
standalonephotovoltaic system
solarpower charge regulatorsee
seephotovoltaicsystem
regulator
S t a t e o f C h a rg e ( S o C ) . T h e
spectrumseeelectromagnetic
spectrum
amount of charge present in a bat-
tery,determined by the currentvolt-
spectrumanalyzer. A devicethat
ageand type of battery.
provides a visual representation of
statefulinspection. Firewallrules
theelectromagnetic spectrum.See
also:Wi-Spy
thatare aware of the thestate asso-
ciatedwith a given packet. Thestate
Speed.A genericterm used to refer
is not part of the packet as transmit-
tedover the Internet, but is deter-
to the responsiveness of a network
mined by the firewallitself.  New,
connection. A "high-speed" network
Glossary
411
clude ACCEPT, DROP, LOG, and
established,and relatedconnections
REJECT.
mayall be taken intoconsideration
whenfilteringpackets.  Statefulin-
TCPseeTransmissionControl
spection is sometimes calledcon-
Protocol
nectiontracking.
stationarybatteries. Batteriesde-
TCPacknowledgment spoofing
signed to have a fixedlocation and
TCPwindow size. TheTCP pa-
in scenarios where the powercon-
sumption is more or lessirregular.
rameterthat defineshow much data
Stationarybatteries canaccommo-
thatmay be sent before an ACK
datedeep discharge cycles, butthey
packet is returned from thereceiving
arenot designed to producehigh
side.For instance, a window size of
currents in brief periods of time.See
3000would mean that twopackets
also:lead-acidbatteries
of 1500 bytes each will be sent, after
whichthe receiving end willeither
structure.In NEC2, a numerical
ACKthe chunk or requestretrans-
description of where thedifferent
mission.
parts of the antenna arelocated,
TCP/IPseeInternetprotocol suite
andhow the wires areconnected
up.See also: controls
TCP/IPnetwork model. A popular
subnetmask seenetmask
simplification of the OSI network
modelthat is used with Internetnet-
subnets.A subset of a range of IP
works.The TCP/IP modelconsists
networks, defined by netmasks.
of five interdependent layers,from
thephysical through theapplication.
switch.
Seealso: OSInetwork model.
A network device thatpro-
vides a
temporary,dedicated con-
tcpdump. A popular open source
nection
betweencommunicating
Seealso: hub.
devices.
packetcapture and analysistool
available at http://www.tcpdump.org/.
switchingconversion. A DC volt-
Seealso: WinDumpandWireshark.
ageconversion method that uses a
TemporalKey IntegrityProtocol
magneticcomponent to temporarily
(TKIP).An encryptionprotocol used
storethe energy and transform it to
in conjunction with WPAto improve
anothervoltage. Switchingconver-
sion is much more efficientthan lin-
thesecurity of a communications
earconversion.
session.
thermalsolar energy. Energycol-
T
lectedfrom the sun in theform of
heat.See also: photovoltaicsolar
energy
target.In netfilter,the action to be
takenonce a packet matches a rule.
Somepossible netfiltertargets in-
412
Glossary
thrashing.Thestate when a com-
traceroute / tracert. A ubiquitous
puterhas exhausted theavailable
networkdiagnostic utility oftenused
RAMand must use thehard disk for
in conjunction with ping to determine
temporarystorage, greatlyreducing
thelocation of networkproblems.
systemperformance.
The Unix version is called
traceroute,while the Windowsver-
throughput.Theactual amount of
sion is tracert. Both use ICMPecho
informationper second flowing
requestswith increasing TTLvalues
through a network connection,dis-
to determine which routers areused
regardingprotocol overhead.
to connect to a remote host,and
alsodisplay latency statistics.  An-
throughputtesting tools. Tools
othervariant is tracepath,which
thatmeasure the actualbandwidth
uses a similar technique withUDP
packets.See also: mtr.
availablebetween two points on a
network.
tractionbatteries seelead-acid
Time To Live (TTL). A TTLvalue
batteries
acts as a deadline or emergency
TransmissionControl Protocol
brake to signal a time when thedata
(TCP).A sessionoriented protocol
should be discarded. In TCP/IPnet-
works,the TTL is a counterthat
thatoperates at the TransportLayer,
starts at some value (such as 64)
providingpacket reassembly,con-
and is decremented at eachrouter
gestionavoidance, and reliablede-
hop.   If the TTL reacheszero, the
livery.  TCP is an integralprotocol
packet is discarded. Thismecha-
used by many Internetapplications,
nismhelps reduce damagecaused
includingHTTP and SMTP.
See
also:UDP.
by routing loops. In DNS, theTTL
definesthe amount of time that a
transmissionpower. Theamount
particularzone record should be
keptbefore it must be refreshed. In
of power provided by theradio
Squid,the TTL defineshow long a
transmitter,before any antennagain
cachedobject may be kept before it
or line losses.
must be again retrieved fromthe
transparentbridging firewall.   A
originalwebsite.
firewalltechnique that introduces a
TKIPseeTemporalKey Integrity
bridgethat selectivelyforwards
Protocol
packetsbased on firewallrules.
Onebenefit of a transparent bridg-
TNCconnector. A common,sturdy
ingfirewall is that it does notrequire
an IP address. See also:bridge.
threadedmicrowave connector.
Tor(http://www.torproject.org/). An
transparentcache.  A method of
onionrouting toolthat provides
implementing a site-wide web cache
goodprotection against traffic
thatrequires no configuration on the
analysis.
webclients.  Web requestsare si-
lentlyredirected to the cache,which
Glossary
413
U
makesthe request on behalf of the
client.  Transparent cachescannot
useauthentication, which makes it
impossible to implement traffic ac-
U.FL.A verytiny microwave con-
counting at the user level. Seealso:
nectorcommonly used on mini-PCI
site-wideweb cache, Squid.
radiocards.
transparentproxy. A cachingproxy
UDP seeUserDatagram Protocol
installed so that users webrequests
areautomatically forwarded to the
unintentionalusers. Laptopusers
proxyserver, without any need to
whoaccidentally associate to the
manuallyconfigureweb browsers to
wrongwireless network.
useit.
UnshieldedTwisted Pair(UTP).
transportlayer. Thethird layer of
Cableused for 10baseTand
theOSI and TCP/IP networkmod-
100baseTEthernet, consisting of
els,which provides a method of
fourpairs of twistedwires.
reaching a particular service on a
givennetwork node. Examples of
UsefulCapacity (Cu ). Theusable
protocolsthat operate at thislayer
capacity of a battery, equal to the
areTCPandUDP.
product of the NominalCapacity
andthe MaximumDepth of Dis-
trending.A type of network monitor-
charge.
ingtool that performsunattended
monitoringover long periods,and
UserDatagram Protocol(UDP). A
plotsthe results on a graph.Trend-
connectionlessprotocol (atthe
ingtools allow you to predictfuture
transportlayer) commonlyused for
behavior of your network,which
videoand audio streaming.
helpsyou plan for upgradesand
changes.
UTPseeUnshieldedTwisted Pair
TTLseeTime To Live
V
tunnel. A form of data encapsula-
tionthat wraps one protocolstack
valveregulated lead acidbattery
withinanother. This is often used in
(VRLA) seelead-acidbatteries
conjunctionwith encryption to pro-
tectcommunications frompotential
verticalpolarization. An electro-
eavesdroppers,while eliminating the
magneticfieldwith the electriccom-
need to support encryptionwithin
ponentmoving in a linearvertical
theapplication itself.  Tunnelsare
direction.Most wirelessconsumer
oftenused conjunction withVPNs.
electronicdevices use verticalpo-
larization.See also: circular polari-
zation,vertical polarization
414
Glossary
VerySmall ApertureTerminal
Seealso: BroadbandGlobal Ac-
(VSAT).One of several standards
cessNetwork (BGN) andDigital
VideoBroadcast (DVB-S).
usedfor satellite Internetaccess.
VSAT is the most widelydeployed
W
satellitetechnology used in Africa.
Seealso: BroadbandGlobal Ac-
cessNetwork (BGAN) andDigital
VideoBroadcast (DVB-S).
WANseeWideArea Network
videosender. A 2.4GHz video
War drivers. Wirelessenthusiasts
transmitterthat can be used as an
whoare interested in findingthe
inexpensivesignalgenerator.
physicallocation of wirelessnet-
works.
VirtualPrivate Network (VPN).A
wavelength.Thedistance meas-
toolused to join two networksto-
getherover an untrustednetwork
uredfrom a point on one wave to
(such as the Internet).  VPNsare
theequivalent part of the next,for
oftenused to connect remoteusers
examplefrom the top of onepeak to
to an organization's networkwhen
thenext. Also known as lambda ( ).
traveling or working from home.
VPNsuse a combination of encryp-
WEPseeWiredEquivalent Privacy
tionand tunneling to secure allnet-
worktraffic, regardless of the appli-
wget. An opensource command
cationbeing used.  See also:tun-
linetool for downloading webpages.
nel.
http://www.gnu.org/software/wget/
VoIP(Voiceover IP). A technology
Wi-Fi.A marketingbrand owned by
thatprovides telephone-likefeatures
theWi-Fi Alliance that is used to
over an Internet connection.Exam-
refer to various wirelessnetworking
ples of popular VoIP clientsinclude
technologies(including 802.11a,
Skype,Gizmo Project, MSN Mes-
802.11b,and 802.11g). Wi-Fi is
senger,and iChat.
shortfor WirelessFidelity.
VPNseeVirtualPrivate Network.
Wi-FiProtected Access (WPA). A
fairlystrong link layer encryption
VRLAseevalveregulated lead
protocolsupported by mostmodern
acidbattery
Wi-Fiequipment.
VSATseeVerySmall Aperture
Wi-Spy.An inexpensive2.4 GHz
Terminal
spectrumanalysis toolavailable
fromhttp://www.metageek.net/.
VerySmall ApertureTerminal
(VSAT).One of several standards
WideArea Network (WAN).Any
usedfor satellite Internetaccess.
longdistance networkingtechnol-
VSAT is the most widelydeployed
ogy.
Leasedlines, frame relay,
satellitetechnology used in Africa.
DSL,fixedwireless, and satelliteall
Glossary
415
typicallyimplement wide areanet-
works.See also: LAN.
wiki.A website that allows anyuser
to edit the contents of anypage.
One of the most popular publicwikis
is http://www.wikipedia.org/
windowscale. A TCPenhancement
defined by RFC1323 thatallows
TCPwindow sizes larger than64KB.
WinDump.TheWindows version of
tcpdump.
It is available from
http://www.winpcap.org/windump/
WiredEquivalent Privacy (WEP).A
somewhatsecure link layer en-
cryptionprotocolsupported by vir-
tuallyall 802.11a/b/gequipment.
WirelessFidelity seeWi-Fi.
wireshark.A freenetwork protocol
analyzerfor Unix andWindows.
http://www.wireshark.org/
WPAseeWi-FiProtected Access
Z
Zabbix(http://www.zabbix.org/)   A
realtimemonitoring tool thatlogs
andnotifies a systemadministrator
aboutservice and networkoutages.