The Switch is called a backbone, where the load of more than one switch on the network systems is collected or the main load begins.
A virtual agent used to infiltrate a system and access the system.
The process of retrieving copies of the information we store on the computer to protect against corruption.
On Windows NT systems, a copy of the information on the system is kept on the computer.
It is used to express the capacity of any transmission medium of communication channel. The channel is the maximum frequency that can be carried on a communication channel.
The full capacity of the communication medium is used for a single channel.
Unit of information flow rate on serial lines in computer controlled systems.
It is a unit of memory measurement, which, in electronic and computer science, usually incorporates 1 or 0 values during an 8-bit sequence and is independent of the type of information recorded.
Donanım veya yazılımların performanslarını ölçmek için kullanılan testlere verilen isim.
(Border Gateway Protocol) It is a network protocol that allows extensive information sharing and routing between autonomous systems on the Internet.
The smallest amount of information that can be transmitted. An alphabetic karaketry is a combination of indicating a numeric digit or altering signaling and other functions.
It is a type of network independent of the Internet Network, exclusive only to educational institutions.
It is a digital unit of measure used to measure the transmission rate of data. Many providers, such as network and hardware manufacturers, use the bit rate value to help users calculate how much speed and efficiency they will receive from their products.
It is a form of connectivity developed in the IEEE 802.3 standard. The cable model used is thin coaxial.
(The longest connecting distance is 185 meters.)
Hackers are infected computers that are remotely controlled.
The name given to the process of returning a part of an e-mail that was sent when it encountered an error in delivery.
BPL is a term used to describe broadband connections that go through an electrical outlet.
It is called the number of bits carried per second from a transmission line.
A network bridge is the name of one of the network elements that connect two computer networks. This occurs in the data layer, the second of the OSI seven-layer model.
It is the method used to deliver data to the destination between 2 ends. Bridging (bridging) method determines the target of the data and ensures that it is delivered in the right direction.
The capacity of the communication medium is used for multi-channel.
It is a type of transmission which is made to a receiver rather than a point and its environment is not only a network, it can also be made by radio waves locally or by satellite.
The broadcast area is part of a smaller computer network with boundaries defined by routers and other high-layer devices.
It is based on the principle that each station transmits the signal to all other stations in the network environment at the same time. After the signal is emitted, the transmitter searches for the destination separately from the entire network until it finds the station where the address matches, so there is no transmission.
It is the method used to decode passwords by trial and error method.
Burst is a block of data transmitted at once.
It is formed by connecting all terminals (servers, workstations and other peripherals) along a cable to a linear cable segment. This segment is called Trunk.
The first octet in the IP address is between 128 and 191, and the subnet mask used is 255.255.0.0. In other words, the first two octets show the Network ID and the other two octets show the Host ID.
ePati Cyber Security Co.
Mersin Üniversitesi Çiftlikköy Kampüsü
Teknopark İdari Binası Kat:4 No: 411
Posta Kodu: 33343
Yenişehir / Mersin / TURKEY
Tel: +90 324 361 02 33
Fax: +90 324 361 02 39