Networking Router
Switch IP Address
Protocol LAN
WAN Firewall

 

A networking device that forwards data packets between computer networks. The practice of connecting computers and other devices together to share information and resources.
A unique numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. A networking device that forwards packets on network using MAC addresses.
A computer network that covers a small area, typically within a single building or office. A set of rules and procedures governing the transmission of data between devices on a computer network.
A network security device that monitors and filters incoming and outgoing network traffic based on predetermined security rules. Wide Area Network – a computer network that covers a large geographical area, typically spanning multiple locations and using public or private communication links.

 

DNS Ethernet
PAN Network
Topology Packet
Bandwidth Latency

 

A widely used technology for wired LANs that allows devices to communicate with each other. Domain Name System – a system used to translate human-readable domain names (e.g., www.example.com) into IP addresses (e.g., 192.0.2.1) that computers can understand.
A group of computers, servers, and devices joined together, enabling communication and the exchange of data. A network that links devices near an individual, usually employing wireless technologies like Bluetooth.
A unit of data transmitted over a network comprises a header and payload, which contain the actual information being sent. The physical or logical arrangement of devices and connections in a network is defined by the organization and structure of network components.
The time it takes for a data packet to travel from its source to its destination, often measured in milliseconds. The maximum amount of data that can be transmitted over a network connection in a given amount of time.

 

Scalability Quality Of Service (Qos)
Traffic Shaping Internet Of Things
Fitness Tracking Wearable Devices
Smartwatches Healthcare Monitoring

 

The ability of a network to prioritize certain types of traffic or data, ensuring that critical applications or services receive higher priority and better performance. The ability of a network to easily accommodate an increasing number of users, devices, or data traffic without a significant decrease in performance.
A network of physical devices, vehicles, appliances, and other objects embedded with sensors, software, and network connectivity, which enables these objects to connect and exchange data. The process of managing or controlling the flow of network traffic to improve performance, prioritize certain types of traffic, or prevent congestion.
Electronic devices that can be worn on the body and are equipped with wireless connectivity for personal area network use. The use of personal area networks to track and monitor fitness-related data, such as steps taken, heart rate, and calories burned.
The use of personal area networks to monitor and track healthcare-related data, such as blood pressure, glucose levels, and medication adherence. Wearable devices that have the capability to connect to personal area networks and offer features beyond just timekeeping, such as fitness tracking, notifications, and app integration.

 

Personalized Entertainment Smart Homes
Location Tracking Mobile Payments
Encryption WLAN
Wireless Access Point SSID

 

Homes that are equipped with various smart devices and appliances that can be controlled and automated through personal area networks. The use of personal area networks to deliver personalized entertainment content, such as streaming music, movies, and TV shows to personal devices.
The use of personal area networks to enable secure and convenient mobile payments using smartphones, wearables, or other personal devices. The use of personal area networks to track and monitor the location of individuals or objects, often used for navigation, asset tracking, or geofencing.
A wireless local area network that allows devices to connect and communicate wirelessly within a limited area. A method used to scramble data using a secret code in order to protect it from unauthorized access.
Service Set Identifier, a unique name assigned to a wireless network to distinguish it from others. A hardware device that allows wireless devices to connect to a wired network using Wi-Fi.

 

Frequency Band Signal Strength
Client Server Peer To Peer
Server Client
Centralized Decentralized

 

The power level of the radio signal transmitted between devices in a wireless network, measured in decibels (dBm). The range of radio frequencies used for wireless communication, such as 2.4 GHz and 5 GHz.
A network where all devices have equal capabilities and responsibilities, and can directly communicate with each other without a central server. A network architecture where tasks are divided between servers and clients, with servers providing resources and clients requesting resources.
A computer or system that requests and utilizes services or resources provided by servers in a network. A computer or system that provides services or resources to other computers or devices in a network.
A system or architecture where resources and communication are distributed among multiple devices or nodes without a central authority. A system or architecture where a central server or authority controls and manages all resources and communication.

 

Reliability Security
Efficiency P2P Network
File Sharing Distributed Network
Resource Sharing Fault Tolerance

 

The measures and protocols in place to protect data, resources, and communication from unauthorized access, attacks, and threats. The ability of a system or network to consistently perform its intended functions accurately and without failure.
A decentralized network where computers communicate and share resources directly with each other without the need for a central server. The optimization and effective utilization of resources in a system or network to achieve maximum output with minimal waste or redundancy.
A network where processing and data storage tasks are spread across multiple computers or servers. The process of distributing or transferring files from one computer to another over a P2P network.
The ability of a network to continue operating and functioning properly even when some of its components or nodes fail. The ability for computers connected in a P2P network to share their computing power, storage space, or other resources.

 

Network Speeds Ping
Download Speed Upload Speed
Throughput Jitter
Packet Loss TCP

 

A utility used to test the reachability of a network host and measure the round-trip time for packets. The rate at which data can be transferred between devices on a network.
The speed at which data is transferred from a device to the internet. The speed at which data is transferred from the internet to a device.
The variation in latency or packet delay on a network. The actual amount of data that can be transmitted over a network in a given amount of time.
A network protocol used for reliable communication between devices. The percentage of data packets that are lost or discarded during transmission on a network.

 

UDP HTTP
HTTPS FTP
SMTP Pop3
IMAP SSH

 

A protocol used for the transmission of data over the internet, often used to retrieve web pages and other resources. A network protocol used for sending data packets between devices quickly, but without guaranteed reliability.
A network protocol used for transferring files between devices over the internet. A protocol used for the secure transmission of data over the internet, often used for online transactions and other sensitive information.
A protocol used for retrieving email from a server. A protocol used for sending and receiving email over the internet.
A protocol used for secure remote access to a device over the internet. A protocol used for accessing email stored on a server.

 

NTP DHCP
ARP IPSEC
Network Protocol Handshake
Standard Ipv4

 

A protocol used for automatically assigning IP addresses to devices on a network. A protocol used for synchronizing the time between devices on a network.
A protocol used for secure communication over the internet, often used for virtual private networks (VPNs). A protocol used for resolving MAC addresses to IP addresses on a network.
A process in which two devices establish communication by exchanging predetermined signals or messages. A set of rules that govern the exchange of data between devices in a network.
A version of the Internet Protocol that uses a 32-bit address scheme for identifying devices on a network. A widely accepted and recognized specification or protocol used for uniformity and compatibility.

 

Ipv6 SSL/TLS

 

Cryptographic protocols designed to provide secure communication over a computer network. The most recent version of the Internet Protocol, designed to replace IPv4, using a 128-bit address scheme.