TACACS

TACACS (Terminal Access Controller Access Control System) is an authentication protocol that was commonly used in UNIX networks. TACACS allows a remote access server to communicate with an authentication server in order to determine if the user has access to the network. TACACS is an encryption protocol and therefore less secure than TACACS+, the later version of TACACS. For more information, please refer to this page
http://www.networksorcery.com/enp/protocol/tacacs.htm



TACACS+

TACACS+ (Terminal Access Controller Access Control System plus) protocol is the latest generation of TACACS. TACACS+ provides access control for routers, network access servers and other networked computing devices via one or more centralized servers. The separation of authentication, authorization and accounting is a fundamental component of the design of TACACS+. A very important benefit to separating authentication from authorization is that authorization can be a dynamic process. TACACS+ uses TCP for its transport. For more information, please refer to this page
http://www.networksorcery.com/enp/protocol/TACACS+.htm




TCP

TCP (Transmission Control Protocol) is a set of rules (protocol) used along with the Internet Protocol (IP) to send data in the form of message units between computers over the Internet. In other words, IP protocol deals only with packets, TCP enables two hosts to establish a connection and exchange streams of data. TCP guarantees delivery of data and also guarantees that packets will be delivered in the same order in which they were sent.

For example, when an HTML file is sent to you from a Web server, the Transmission Control Protocol (TCP) program layer in that server divides the file into one or more packets, numbers the packets, and then forwards them individually to the IP program layer. Although each packet has the same destination IP address, it may get routed differently through the network. At the other end (the client program in your computer), TCP reassembles the individual packets and waits until they have arrived to forward them to you as a single file. For more information, please refer to this page http://www.networksorcery.com/enp/protocol/tcp.htm.



Telnet

Telnet is a terminal emulation protocol commonly used on the Internet and TCP/IP-based networks. It allows a user at a terminal or computer to log onto a remote device and run a program.

On the Web, HTTP and FTP protocols allow you to request specific files from remote computers, but not to actually be logged on as a user of that computer. With Telnet, you log on as a regular user with whatever privileges you may have been granted to the specific application and data on that computer. Telnet enables you to control the server and communicate with other servers on the network. To start a Telnet session, you must log in to a server by entering a valid username and password. For more information, please refer to this page
http://www.networksorcery.com/enp/protocol/telnet.htm




Terminal

A device that enables you to communicate with a computer. Generally, a terminal is a combination of keyboard and display screen.


Token-ring network

Token-ring network is a type of computer network in which all the computers are arranged (schematically) in a circle.





Topology

Topology is the shape of a local-area network (LAN) or other communications system. Topologies are either physical or logical. There are four principal topologies used in LANs.

a. bus topology
b. ring topology
c. star topology
d. tree topology




Transponder

A wireless communications device usually attached to a satellite. A transponder receives and transmits radio signals at a prescribed frequency range. In other words, a transponder is a wireless communications, monitoring, or control device that picks up and automatically responds to an incoming signal. After receiving the signal a transponder will at the same time broadcast the signal at a different frequency.



Tunneling

Tunneling is a technology that enables one network to send its data via another network's connections. Tunneling works by encapsulating a network protocol within packets carried by the second network. Tunneling is also called encapsulation.