1 | 4 | 6 | |||||||||||||||||||
2 | |||||||||||||||||||||
5 | |||||||||||||||||||||
3 | |||||||||||||||||||||
1. The process of selecting the best path for data packets to travel from source to destination in a network.
2. The process of inspecting packets based on their source and destination addresses, ports, and protocols, and either allowing or blocking them based on predefined rules.
3. A mechanism that prioritizes certain types of network traffic, ensuring higher performance for critical applications or services.
4. A unique numerical label assigned to each device connected to a network that uses the Internet Protocol for communication.
5. The distribution of network traffic across multiple devices or links to optimize resource utilization, maximize throughput, and minimize response time.
6. A network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules