Network | LAN |
WAN | PAN |
MAN | Topology |
Bus topology | Ring topology |
A local area network is a network that connects devices in a limited geographical area such as a home, school, or office building. | A collection of computers and other hardware devices that are connected together to allow communication and resource sharing between them. |
A personal area network is a network that connects devices in a small area such as a personal computer, smartphone, and other Bluetooth enabled devices. | A wide area network is a network that covers a broad area such as a city, country, or even the whole world, and uses leased telecommunication lines to connect devices. |
The physical or logical arrangement of computers and other devices on a network. | A metropolitan area network is a network that connects devices in a geographical area that spans a city or a region, using optical fibers, copper wires, or wireless transmission. |
A network topology in which all devices are connected to each other in a circle or ring, with data transmitted in one direction only. | A network topology in which all devices are connected to a single cable, with both ends of the cable terminated by a device called the terminator. |
Star topology | Mesh topology |
Client-server | Peer-to-peer |
Communication layers | TCP/IP protocol |
Data encapsulation | Physical layer |
A network topology in which devices are connected to each other in a non-linear way, with redundant paths to provide alternate routes in case of failure. | A network topology in which all devices are connected to a central hub or switch using point-to-point connections. |
A network architecture in which all devices have equal status and can act as both clients and servers, sharing resources and communicating with each other directly. | A network architecture in which one or more computers act as servers, providing services or resources to client computers on the network. |
A protocol used for communication over networks that divides communication into four layers - link layer, internet layer, transport layer, and application layer. | The way communication over networks is divided into different layers - each layer accomplishing a specific task. |
The first layer in the OSI model for network communication which deals with the physical characteristics of the medium that sends data and the data encoding scheme. | The process of adding header and footer information to data as it moves down the communication layers. This information helps in identifying the sender, receiver, and other important information about the data. |
Data link layer | Network layer |
Transport layer | Session layer |
Presentation layer | Application layer |
OSI model | Layered approach |
The third layer in the OSI model for network communication which deals with routing data packets from the source to destination via the most efficient path. | The second layer in the OSI model for network communication which deals with node to node delivery of data over the network. |
The fifth layer in the OSI model for network communication which deals with establishing, managing, and terminating communication sessions between applications. | The fourth layer in the OSI model for network communication which deals with ensuring error-free end-to-end delivery of data between systems. |
The seventh layer in the OSI model for network communication which deals with application software that uses network services for communication. | The sixth layer in the OSI model for network communication which deals with the format and syntax of data being exchanged between applications. |
The approach taken to network communication where communication is partitioned into logical layers, with each layer performing a distinct service keeping implementations modular and separate. | Open Systems Interconnection (OSI) model is a conceptual model used for network communication that divides the communication process into seven layers. |
VPN | Computer networks |
Advantages | Disadvantages |
Security | Encryption |
Configuration | Legal |
A set of interconnected devices, such as computers and servers, that communicate with each other to share resources and information. | A virtual private network that uses encryption and other security mechanisms to provide a private connection between two or more devices over the internet. |
The drawbacks or negative aspects of using a VPN, such as slower connection speeds, increased complexity, and potential for service disruptions. | The benefits or positive aspects of using a VPN, such as improved security, privacy, and access to resources. |
The process of encoding information in such a way that only authorized parties can access or read it. | The measures taken to protect information and resources from unauthorized access, use, disclosure, disruption, modification, or destruction. |
Relating to or authorized by law, such as government regulations, contracts, or intellectual property rights. | The settings and options that determine how a device or system operates and interacts with other devices or systems. |
Ethical | Privacy |
Access control | Internet |
Data transmission | Transmission media |
Factors affecting data transmission | Transmission errors |
The right to control access to personal information and avoid unwanted surveillance or tracking. | Relating to moral principles and values, such as privacy, fairness, and responsibility. |
A global network of interconnected computer networks that use standard protocols to communicate and exchange information. | The process of granting or restricting the ability of users or devices to access resources or perform actions based on their identity, role, or other criteria. |
The physical media used to transmit data such as copper wire, fiber optic cable, radio waves, or infrared signals. | The process of transmitting digital or analog signals over a medium from a source to a destination. |
Errors that can occur during data transmission due to noise, interference, or other factors that can cause data corruption. | The various factors such as noise, attenuation, distortion, and interference that can affect the quality of data transmission. |
Data transmission modes | Analog signals |
Digital signals | Synchronous transmission |
Asynchronous transmission | Simplex transmission |
Half-duplex transmission | Full-duplex transmission |
A continuous signal that varies in amplitude or frequency over time and is used in analog transmission. | The methods used to transmit data such as simplex, half-duplex, and full-duplex transmission, synchronous and asynchronous transmission, and parallel and serial transmission. |
Data transmission in which the sender and receiver are synchronized in time and use a clock signal to coordinate data transmission. | Discrete signals that are used in digital transmission and have only two values, 0 and 1. |
A one-way communication mode in which data can be transmitted only in one direction, from the sender to the receiver. | Data transmission in which the sender and receiver do not use a clock signal to synchronize data transmission. |
A two-way communication mode in which data can be transmitted in both directions at the same time. | A two-way communication mode in which data can be transmitted in both directions, but not at the same time. |
OSI model | TCP/IP protocol suite |
Networking | Network topologies |
Protocol | Data packet |
Computer network | TCP/IP |
The Transmission Control Protocol/Internet Protocol suite is a set of communication protocols used for the internet and other similar networks. | The Open Systems Interconnection model is a conceptual model that describes the communication functions of a telecommunication or computing system. |
The physical or logical layout of a network, including bus, ring, star, and mesh topologies. | The process of connecting two or more devices together for the purpose of sharing resources such as data, information, and hardware devices. |
The basic unit of data that is transmitted across a network. | A set of rules that governs the communication between devices in a network. |
A set of protocols that governs the communication between devices in the Internet. | A collection of computers and other devices that are connected together to enable communication and resource sharing. |
HTTP | SMTP |
FTP | Ethernet |
Wi-Fi | IP address |
DNS | Router |
A protocol that is used to transfer email messages between servers and clients. | A protocol that is used to transfer data between a web server and a web client. |
A protocol that governs the communication between devices in a local area network. | A protocol that is used to transfer files between servers and clients. |
A unique identifier that is assigned to devices in a network to enable communication and resource sharing. | A protocol for wireless local area networks that enables devices to connect to the Internet or other networks. |
A device that forwards data packets between networks. | A protocol that is used to translate domain names into IP addresses. |
Data Compression | Network Transmission |
Bandwidth | Latency |
Lossless Compression | Lossy Compression |
JPEG | MPEG |
The process of sending data from one device to another over a network or the internet. | The process of reducing the size of data to transmit it more efficiently over a network. |
The amount of delay between the sending and receiving of data over a network. | The maximum amount of data that can be transmitted over a network in a given amount of time. |
A compression technique that reduces the size of data by removing non-essential information. | A compression technique that reduces the size of data without losing any information. |
A common video compression algorithm that uses lossy compression techniques. | A common image compression algorithm that uses lossy compression techniques. |
ZIP | GZIP |
DEFLATE | Huffman Coding |
Transmission Media | Copper |
Fiber-optic | Satellite |
A common file compression algorithm that uses lossless compression techniques. | A common data compression algorithm that uses lossless compression techniques. |
A lossless compression technique that uses variable-length codes to represent data more efficiently. | A compression algorithm used in many file formats, including PNG, ZIP, and gzip. |
A type of wired transmission media that uses copper wires to transmit data. It is commonly used for local area networks (LANs). | Refers to the physical media that carry signals from sender to receiver. The different types include wired (copper, fiber-optic) and wireless (satellite, microwave, radio) transmission media. |
A type of wireless transmission media that uses communication satellites in orbit to transmit signals. It offers wide coverage area, but is affected by weather and has high latency. | A type of wired transmission media that uses glass or plastic fibers to transmit data. It offers high bandwidth and long distance transmission capabilities, but is expensive to install. |
Microwave | Radio |
Bandwidth | Latency |
Reliability | Attenuation |
Interference | Signal-to-Noise Ratio |
A type of wireless transmission media that uses radio signals to transmit data. It is commonly used for wireless LANs and mobile communication. | A type of wireless transmission media that uses microwave signals to transmit data. It offers high bandwidth and is commonly used for point-to-point communication. |
Refers to the time delay between the transmission and reception of a signal. It is affected by the distance between sender and receiver, and the type of transmission media used. | Refers to the amount of data that can be transmitted over a given period of time. It is measured in bits per second (bps). |
Refers to the loss of signal strength as it travels along the transmission media. It is affected by factors such as distance, interference, and the type of transmission media used. | Refers to the ability of the transmission media to transmit data accurately and consistently. It is affected by factors such as interference, noise, and signal attenuation. |
Refers to the ratio of the signal power to the noise power in a transmission. It is a measure of signal quality, with higher ratios indicating better quality. | Refers to the disruptions or noise that can affect the transmission of signals. It is caused by factors such as electromagnetic radiation, signal reflection, and environmental factors. |
Packet switching | Circuit switching |
Packets | Router |
Switch | Header |
Payload | Fragmentation |
A method of transmitting data across a network by establishing a dedicated communication path, or circuit, between two devices. | A method of transmitting data across a network by breaking it up into smaller units known as packets, which are then sent individually and reassembled at the destination. |
A network device that forwards data packets between different computer networks. | Small units of data that are transmitted across a network using packet switching. |
The part of a packet that contains information about how it should be handled by the network. | A network device that connects devices together on a local area network (LAN) and forwards data packets between them. |
The process of breaking up a large packet into smaller ones to facilitate transmission across a network. | The actual data being transmitted in a packet. |
Reassembly | Latency |
Congestion | Reliability |
Data transmission | Speed of data transmission |
Bandwidth | Latency |
The time it takes for a packet to travel across a network. | The process of putting together multiple smaller packets to recreate the original data. |
The ability of packet switching to handle packet loss and deliver data accurately and efficiently. | The situation that occurs when too many packets are being transmitted across a network, causing delays and packet loss. |
The rate at which data is transmitted over a network or communication channel. | The process of sending and receiving data over a network or communication channel. |
The time it takes for data to travel from one point to another on a network or communication channel. | The maximum amount of data that can be transmitted over a network or communication channel in a given amount of time. |
Factors affecting data transmission speed | Transmission medium |
Network congestion | Packet loss |
Data compression | Caching |
Quality of Service (QoS) | Jitter |
The physical path through which data is transmitted on a network. | The characteristics of the network, transmission medium, and devices in the network that affect the speed at which data is transmitted. |
The failure of one or more transmitted packets to arrive at their destination on a network. | The situation that occurs when there is more data being transmitted on a network than the network can handle. |
The process of storing frequently accessed data in a local cache to reduce the amount of data that needs to be transmitted over a network. | The process of reducing the size of data to be transmitted over a network by encoding it using fewer bits. |
The variation in the delay of packet delivery on a network. | The ability of a network to provide predictable levels of service and performance to different types of traffic. |
Wireless networks | Radio waves |
Bandwidth | Mobility |
Convenience | Scalability |
Interference | Security |
Electromagnetic waves that are used to transmit data in wireless networks. | A type of computer network that allows devices to connect and communicate without the need for physical wires or cables. |
The ability to move around while staying connected to a wireless network. | The amount of data that can be transmitted over a network in a given amount of time. |
The ability to expand or contract a wireless network easily to meet changing demands. | The ease and flexibility of being able to connect to a wireless network from almost anywhere. |
A concern with wireless networks due to the potential for unauthorized access and data breaches. | A problem with wireless networks that occurs when multiple signals are transmitted at the same frequency and interfere with each other. |
Reliability | Cost |
Range | Infrastructure |
Wireless Network | Hardware Components |
Software Components | Router |
The financial considerations associated with setting up and maintaining a wireless network. | The ability of a wireless network to maintain a consistent and stable connection. |
The physical components and systems that enable a wireless network to function. | The maximum distance over which a wireless signal can be transmitted between devices. |
The physical devices that make up a wireless network, including routers, access points, and antennas. | A type of computer network that enables devices to communicate without using cables or wires. |
A hardware device that connects multiple networks together and directs data traffic between them. | The programs and applications that control and manage the hardware components of a wireless network, including protocols and security measures. |
Access Point | Antenna |
Encryption | Authentication |
SSID | MAC Address |
Firewall | Protocol |
A device that transmits and receives wireless signals between devices on a network. | A networking hardware device that allows Wi-Fi devices to connect to a wired network. |
The process of verifying the identity of a user or device before allowing access to a network or system. | The process of converting data into an unreadable format to prevent unauthorized access. |
A unique identifier assigned to a network interface controller (NIC) for use as a network address in communications within a network. | A unique identifier for a wireless network that allows devices to connect to it. |
A set of rules that govern the format and transmission of data over a network. | A security system that prevents unauthorized access to or from a private network. |
Wireless Networks | Radio Waves |
Access Point | SSID |
Encryption | Frequency Band |
Ad Hoc Network | Infrastructure Network |
The frequency range used to transmit wireless signals between devices. | A type of computer network that allows devices to communicate without the need for cables or wires. |
A unique identifier for a wireless network that allows devices to distinguish it from other networks in the vicinity. | A device that allows wireless devices to connect to a wired network using Wi-Fi or other wireless protocols. |
The range of radio frequencies used by a wireless network to transmit data. | The process of encoding data transmitted over a wireless network to prevent unauthorized access. |
A wireless network that uses an access point or router to connect devices to a wired network. | A wireless network that connects devices directly without the need for an access point. |
Mesh Network | Latency |
Interference | Cost |
Encryption | Firewall |
Intrusion Detection System | Virtual Private Network |
The delay between the transmission and reception of data over a wireless network. | A decentralized wireless network in which all devices can communicate with each other. |
The price of wireless equipment and service, which can be more expensive than wired networks. | Any signal or noise that disrupts wireless transmissions and causes data errors or slowdowns. |
A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. | A method used to secure information by converting it into code that only authorized parties can read. |
A secure, encrypted connection that allows remote access to a private network over the internet. | Software or hardware systems that automatically detect and respond to unauthorized attempts to access a network or computer system. |
Authentication | Access Control |
Biometrics | Penetration Testing |
Vulnerability Assessment | Antivirus |
Patch Management | Data Backup and Recovery |
A security process that limits access to a network or system based on the user's identity, role, or other factors. | The process of verifying the identity of a user or device attempting to access a network or system, typically through a password or other credentials. |
A process in which security professionals attempt to exploit vulnerabilities in a network or system to identify potential security risks. | A security process that uses unique physical characteristics such as fingerprints or facial recognition to verify the identity of a user attempting to access a network or system. |
Software programs designed to prevent, detect, and remove malicious software from a computer or network. | A process that identifies and quantifies potential vulnerabilities in a network or system in order to determine the level of risk and plan appropriate security measures. |
A process of creating and storing copies of data for the purpose of restoring the original data in case of data loss, corruption, or other failures. | A process that ensures a network or system is up-to-date with the latest security patches and updates to prevent vulnerabilities from being exploited. |
Authentication | Encryption |
Firewall | Intrusion Detection System (IDS) |
Intrusion Prevention System (IPS) | Virtual Private Network (VPN) |
Access Control | Antivirus/Antimalware |
The process of converting data into an unreadable form to prevent unauthorized access or data theft. | The process of identifying a user or system, often by requiring a username and password. |
A system that monitors network traffic for signs of possible malicious activity or policy violations. | A hardware or software system designed to prevent unauthorized access to or from a private network. |
A secure, encrypted network connection between two devices or networks over the internet. | A system that monitors network traffic for signs of possible malicious activity or policy violations and takes action to prevent them. |
Software designed to detect, prevent, and remove malware and other malicious software. | The process of limiting access to a system or network based on user permissions and privileges. |
Application Security | Data Loss Prevention (DLP) |
Penetration Testing | Social Engineering |
A strategy or system designed to prevent data loss or leakage, often by monitoring data usage and access. | Protecting software applications and systems from unauthorized access, modification, or misuse. |
The use of deception or manipulation to gain unauthorized access to sensitive information or systems. | The process of testing a system or network for vulnerabilities by attempting to exploit them. |