Specifications

29
30
DDNS (Dynamic Domain Name Service)
DDNS (Dynamic DNS) service enables users from the Internet to connect
to the servers on your local network by using a domain name rather than
an IP address. To use this service, you must register an account from a
free DDNS server. Please refer to user manual for more information.
DNS (Domain Name Service)
Domain Name Service identies each computer as a network node on
the Internet using an internet protocol address system to translate from
domain names to IP numbers and vice-versa.
Domain Name: An address of a web site usually a word or group of words
that are placed in the fashion of the following:192.168.1.254
DHCP IP
An address with numbers like the one in a static IP address that is
assigned to your computer by your ISP’s server so that other computer
servers can nd your computer when you are connected to the internet.
This IP address changes because whatever IP address is available at the
time you log on is the one that you get.
DMZ
DMZ stands for Demilitarized Zone. A DMZ is your frontline when
protecting valuable information from direct exposure to an untrusted
environment. SI Security denes a DMZ as, “a network added between
a protected network and an external network in order to provide an
additional layer of security.A DMZ is sometimes called a “Perimeter
network” or a “Three-homed perimeter network.” A DMZ separates an
external network from directly referencing an internal network. It does
this by isolating the machine that is being directly accessed from all
other machines. Most of the time the external network is the Internet
and what is in the DMZ is the web server .but this isn’t the only possible
conguration. A DMZ can be used to isolate a particular machine within
a network from other machines. This might be done for a branch ofce
that needs its own Internet access but also needs access to the corporate
network. In DMZ terminology, an internal connection is generally thought
of as having more secret or valuable information than an external
network. An easy way to understand which is the external and internal
network is to ask yourself which network am I protecting from the other.
FTP (File Transfer Protocol)
This is a method of moving les from system to system using
TCP/IP with FTP application.
NAT (Network Address Translation)
A networking technology that allows a group of computers using private
IP addresses to share a single public IP address to access
the Internet.
NFS (Network File System)
NFS is a protocol suite developed and licensed by Sun Microsystems that
allows different makes of computers running different operating systems
to share les and disk storage.
PDC Authentication (Primary Domain Controller
Authentication)
In Windows NT, this machine is the main machine that responds to
security authentication requests, such as logging in, within its domain.
The PDC may be backed by one or more backup domain controllers that
can also handle security authentication.
RAID Storage Management (Redundant Array of
Individual Disk)
JBOD
Sometimes referred to as “Just a Bunch of Drives.” Each drive is operated
independently like a normal disk controller, or drives may
be spanned and seen as a single drive. This level does not provide data
redundancy.
RAID 0
RAID 0 provides striping across multiple drives, yielding higher performance
than is possible with individual drives. There is, however,
no redundancy provision.
RAID 1
In RAID 1, all drives are paired, and then mirrored. All data is duplicated
100% on a separate drive of the equivalent size. If one drive is
smaller, then the total size of storage space available will be the capacity of
the smaller disk.
RAID 5
In RAID 5, data is striped across several physical drives. For data
redundancy, drives are encoded with rotated XOR redundancy. Each
entire block is written on a data disk; parity for blocks in the same rank is
generated on Writes, recorded in a distributed location and checked on
Reads. To implement RAID 5, a minimum of 3 drives is required.
Hot Spare
A physical disk drive not part of a system drive that the controller can use to
automatically rebuild when a critical system drive fails. The hot spare drive
must have at least as much capacity as the largest disk drive in the array or
the rebuild may not start.
SATA
SATA (Serial ATA) is the next generation IDE/ATA transfer interface.
The maximum transfer rate of traditional PATA (Parallel ATA) interface is
133MBytes/sec, with 40-pin transfer cable. Too many pins may lead to high
temperature of the system due to difcult heat release. The newer SATA
interface provides maximum transfer rate of up to 300MBytes/sec, with
7-pin transfer cable. Because of less pins, the system can release heat
more easily
SMTP Notication
(Simple Mail Transport Protocol Notication)
SMTP is a server-to-server protocol, so other protocols (POP3, IMAP etc.)
are used to access the messages. The SMTP dialog
usually happens in the background under the control of the message
transport system, e.g. send-mail but it is possible to interact with an SMTP
server using telnet to connect to the normal SMTP port, 25.
SMB (Server Message Block)
This is a client-server method of communication that allows a client to make
requests for resources over a network. A server responds
to these requests. SMB runs over most common network protocols,
including NetBEUI, IPX/SPX and TCP/IP.
SNMP Notication
(Small Network Management Protocol Notication)
SNMP is a simple request/response protocol that communicates
management information between two types of SNMP software
entities: SNMP applications (also called SNMP managers) and SNMP
agents. SNMP applications run in a network management
station and issue queries to gather information about the status,
conguration, and performance of external network devices
(called network elements in SNMP terminology). The Bay Networks Site
Manager software is an example of a network management
station, and the Bay Networks backbone node (BNR) router is an example
of a network element.
››
Terms & Glossary