HP Vectra VE C/xxx 7 HP Vectra VE C/xxx Series 7 PC - Network Administration G - Page 111

Plug and Play, protocol, protocol stack, Redirector, registry, repeater, ring topology

Page 111 highlights

Glossary Plug and Play Referred to as PNP, a specification originated by Microsoft for hardware and software architecture that allows for automatic device identification and configuration. PROM Programmable Read Only Memory. A memory chip that can be written to only once. The difference between a PROM and a ROM is that a PROM is manufactured blank, whereas a ROM is programmed during manufacturing. To write data to a PROM, a special device called a PROM programmer (or burner) is needed. Programming a PROM is often referred to as burning a PROM. protocol A formalized set of rules that describes how data should be exchanged between two entities. Protocols are typically divided into modular layers, where each layer performs a specific function for the layer above. Protocols allow products from different vendors to communicate on the same network. One of the most popular LAN protocols is Ethernet. Another common LAN protocol is IBM's token-ring network. protocol stack The collection of software modules that implements a particular network protocol (such as TCP/IP). RAM Random Access Memory. Any type of computer memory that can be accessed randomly. RAM is the most common type of memory found in computers. RAM comes in two basic types: SRAM (Static RAM) and DRAM (Dynamic RAM). SRAM and DRAM differ in the technologies used to store their data. SRAM is faster, and hence, more expensive than DRAM. RAM is volatile in nature and will not retain its contents when power is turned off. In common usage, RAM is often referred to as main memory which is used to store programs and data. Redirector A software module that is loaded into every network station. It captures application program requests for file and peripheral services and routes them through the network: that is, the redirector transforms client-side requests into network requests. registry A database maintained by Microsoft Windows 95 for storing hardware and software configuration information. The registry is used heavily in Plug and Play systems. repeater A repeater is used to extend the physical topology of the network, allowing two or more cable segments to be coupled together. No more than four repeaters are permitted between any two stations. ring topology A network topology in which all devices are connected together in the shape of a closed loop. Ring networks are relatively expensive and difficult to install. However, they are robust (one failed device will not cause the entire network to fail). Most ring networks use a token-passing protocol that allows a device on the ring to send messages out when it receives a special bit pattern called a token. 111 English

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112

111
English
Glossary
Plug and Play
Referred to as PNP, a
specification originated by Microsoft
for hardware and software
architecture that allows for automatic
device identification and
configuration.
PROM
Programmable Read Only
Memory. A memory chip that can be
written to only once. The difference
between a PROM and a ROM is that a
PROM is manufactured blank,
whereas a ROM is programmed during
manufacturing. To write data to a
PROM, a special device called a PROM
programmer (or burner) is needed.
Programming a PROM is often
referred to as burning a PROM.
protocol
A formalized set of rules
that describes how data should be
exchanged between two entities.
Protocols are typically divided into
modular layers, where each layer
performs a specific function for the
layer above. Protocols allow products
from different vendors to communicate
on the same network. One of the most
popular LAN protocols is Ethernet.
Another common LAN protocol is
IBM's token-ring network.
protocol stack
The collection of
software modules that implements a
particular network protocol (such as
TCP/IP).
RAM
Random Access Memory. Any
type of computer memory that can be
accessed randomly. RAM is the most
common type of memory found in
computers. RAM comes in two basic
types: SRAM (Static RAM) and DRAM
(Dynamic RAM). SRAM and DRAM
differ in the technologies used to
store their data. SRAM is faster, and
hence, more expensive than DRAM.
RAM is volatile in nature and will not
retain its contents when power is
turned off. In common usage, RAM is
often referred to as main memory
which is used to store programs and
data.
Redirector
A software module that
is loaded into every network station. It
captures application program
requests for file and peripheral
services and routes them through the
network: that is, the redirector
transforms client-side requests into
network requests.
registry
A database maintained by
Microsoft Windows 95 for storing
hardware and software configuration
information. The registry is used
heavily in Plug and Play systems.
repeater
A repeater is used to
extend the physical topology of the
network, allowing two or more cable
segments to be coupled together. No
more than four repeaters are
permitted between any two stations.
ring topology
A network topology
in which all devices are connected
together in the shape of a closed loop.
Ring networks are relatively
expensive and difficult to install.
However, they are robust (one failed
device will not cause the entire
network to fail). Most ring networks
use a token-passing protocol that
allows a device on the ring to send
messages out when it receives a
special bit pattern called a token.