1 | 6 | ||||||||||||||||||||||
5 | |||||||||||||||||||||||
4 | |||||||||||||||||||||||
2 | |||||||||||||||||||||||
3 | |||||||||||||||||||||||
1. A mechanism that prioritizes certain types of network traffic, ensuring higher performance for critical applications or services.
2. The process of inspecting packets based on their source and destination addresses, ports, and protocols, and either allowing or blocking them based on predefined rules.
3. A unique numerical label assigned to each device connected to a network that uses the Internet Protocol for communication.
4. The distribution of network traffic across multiple devices or links to optimize resource utilization, maximize throughput, and minimize response time.
5. The process of selecting the best path for data packets to travel from source to destination in a network.
6. A network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules