1 | 15 | ||||||||||||||||||||||||
2 | |||||||||||||||||||||||||
3 | |||||||||||||||||||||||||
4 | |||||||||||||||||||||||||
5 | |||||||||||||||||||||||||
6 | |||||||||||||||||||||||||
7 | |||||||||||||||||||||||||
14 | 8 | 17 | |||||||||||||||||||||||
9 | 16 | ||||||||||||||||||||||||
13 | 10 | ||||||||||||||||||||||||
11 | |||||||||||||||||||||||||
12 | |||||||||||||||||||||||||
1. The set of network protocols and software that enable communication between devices on a computer network.
2. A unique numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication.
3. The process of distributing or transferring files from one computer to another over a P2P network.
4. The ability for computers connected in a P2P network to share their computing power, storage space, or other resources.
5. The use of personal area networks to track and monitor the location of individuals or objects, often used for navigation, asset tracking, or geofencing.
6. The speed at which data is transferred from a device to the internet.
7. The rate at which data can be transferred between devices on a network.
8. A networking device that forwards packets on network using MAC addresses.
9. Cryptographic protocols designed to provide secure communication over a computer network.
10. The process of determining the optimal path for data packets to travel from the source to the destination in a network.
11. The use of personal area networks to monitor and track healthcare-related data, such as blood pressure, glucose levels, and medication adherence.
12. The bottommost layer in the TCP/IP network stack responsible for physical transfer of bit streams.
13. A computer or system that requests and utilizes services or resources provided by servers in a network.
14. The range of radio frequencies used for wireless communication, such as 2.4 GHz and 5 GHz.
15. A network topology in which centralized servers or services provide resources and respond to requests from client devices.
16. The measures and protocols in place to protect data, resources, and communication from unauthorized access, attacks, and threats.
17. A type of network topology in which nodes are arranged in a hierarchical structure, resembling a tree.