Terms Beginning with M

M2M

Communication between machines is a technology that enables devices to be remotely monitored, managed and communicated with each other by means of a special sim card attached to devices.

Man In The Middle Attack

It is an attack type based on the principle of obtaining data by entering between the target computer and other network tools (such as router, switch, modem or server) on a network.

Masking

It is the technique of blocking the visibility of critical information such as passwords.

Media Access Control (MAC)

A unique address that helps to identify the network hardware of devices on a network that is encoded by the manufacturer on the Ethernet card.

Mesh Topology

It is the type of topology that occurs as a result of the connections between all stations in the network and other stations.

Model

Includes guidance and general concepts for moving data from point A to point B. Defines the services to be provided for communication and which layers are responsible for these services.

epati Information Technologies LLC.

Mersin Üniversitesi Çiftlikköy Kampüsü
Teknopark İdari Binası Kat:4 No: 411
Posta Kodu: 33343
Yenişehir / Mersin / TURKEY

Web: www.epati.com.tr
e-Mail: info@epati.com.tr
Tel: +90 324 361 02 33
Fax: +90 324 361 02 39