1 | 12 | ||||||||||||||||||||||||
16 | |||||||||||||||||||||||||
2 | |||||||||||||||||||||||||
10 | |||||||||||||||||||||||||
15 | |||||||||||||||||||||||||
3 | 11 | ||||||||||||||||||||||||
4 | |||||||||||||||||||||||||
14 | |||||||||||||||||||||||||
5 | |||||||||||||||||||||||||
6 | |||||||||||||||||||||||||
13 | |||||||||||||||||||||||||
7 | 17 | ||||||||||||||||||||||||
8 | |||||||||||||||||||||||||
9 | |||||||||||||||||||||||||
1. A process in which two devices establish communication by exchanging predetermined signals or messages.
2. The process of managing or controlling the flow of network traffic to improve performance, prioritize certain types of traffic, or prevent congestion.
3. Specifies the maximum time the packet is allowed to remain in the network.
4. The measures and protocols in place to protect data, resources, and communication from unauthorized access, attacks, and threats.
5. A unique value used to identify the packet, primarily for reassembly purposes.
6. Indicates the entire packet size, including both header and data, in bytes.
7. The arrangement of various elements of a computer network, such as computers, servers, routers, switches, etc., and the interconnections between them.
8. The set of network protocols and software that enable communication between devices on a computer network.
9. A decentralized network where computers communicate and share resources directly with each other without the need for a central server.
10. A set of rules that govern the exchange of data between devices in a network.
11. The use of personal area networks to enable secure and convenient mobile payments using smartphones, wearables, or other personal devices.
12. The power level of the radio signal transmitted between devices in a wireless network, measured in decibels (dBm).
13. Wearable devices that have the capability to connect to personal area networks and offer features beyond just timekeeping, such as fitness tracking, notifications, and app integration.
14. The process of distributing or transferring files from one computer to another over a P2P network.
15. Specifies the IP address of the intended recipient of the packet.
16. A version of the Internet Protocol that uses a 32-bit address scheme for identifying devices on a network.
17. A network where all devices have equal capabilities and responsibilities, and can directly communicate with each other without a central server.