Networking | Router |
Switch | IP Address |
Protocol | LAN |
WAN | Firewall |
A networking device that forwards data packets between computer networks. | The practice of connecting computers and other devices together to share information and resources. |
A unique numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. | A networking device that forwards packets on network using MAC addresses. |
A computer network that covers a small area, typically within a single building or office. | A set of rules and procedures governing the transmission of data between devices on a computer network. |
A network security device that monitors and filters incoming and outgoing network traffic based on predetermined security rules. | Wide Area Network – a computer network that covers a large geographical area, typically spanning multiple locations and using public or private communication links. |
DNS | Ethernet |
PAN | Network |
Topology | Packet |
Bandwidth | Latency |
A widely used technology for wired LANs that allows devices to communicate with each other. | Domain Name System – a system used to translate human-readable domain names (e.g., www.example.com) into IP addresses (e.g., 192.0.2.1) that computers can understand. |
A group of computers, servers, and devices joined together, enabling communication and the exchange of data. | A network that links devices near an individual, usually employing wireless technologies like Bluetooth. |
A unit of data transmitted over a network comprises a header and payload, which contain the actual information being sent. | The physical or logical arrangement of devices and connections in a network is defined by the organization and structure of network components. |
The time it takes for a data packet to travel from its source to its destination, often measured in milliseconds. | The maximum amount of data that can be transmitted over a network connection in a given amount of time. |
Scalability | Quality Of Service (Qos) |
Traffic Shaping | Internet Of Things |
Fitness Tracking | Wearable Devices |
Smartwatches | Healthcare Monitoring |
The ability of a network to prioritize certain types of traffic or data, ensuring that critical applications or services receive higher priority and better performance. | The ability of a network to easily accommodate an increasing number of users, devices, or data traffic without a significant decrease in performance. |
A network of physical devices, vehicles, appliances, and other objects embedded with sensors, software, and network connectivity, which enables these objects to connect and exchange data. | The process of managing or controlling the flow of network traffic to improve performance, prioritize certain types of traffic, or prevent congestion. |
Electronic devices that can be worn on the body and are equipped with wireless connectivity for personal area network use. | The use of personal area networks to track and monitor fitness-related data, such as steps taken, heart rate, and calories burned. |
The use of personal area networks to monitor and track healthcare-related data, such as blood pressure, glucose levels, and medication adherence. | Wearable devices that have the capability to connect to personal area networks and offer features beyond just timekeeping, such as fitness tracking, notifications, and app integration. |
Personalized Entertainment | Smart Homes |
Location Tracking | Mobile Payments |
Encryption | WLAN |
Wireless Access Point | SSID |
Homes that are equipped with various smart devices and appliances that can be controlled and automated through personal area networks. | The use of personal area networks to deliver personalized entertainment content, such as streaming music, movies, and TV shows to personal devices. |
The use of personal area networks to enable secure and convenient mobile payments using smartphones, wearables, or other personal devices. | The use of personal area networks to track and monitor the location of individuals or objects, often used for navigation, asset tracking, or geofencing. |
A wireless local area network that allows devices to connect and communicate wirelessly within a limited area. | A method used to scramble data using a secret code in order to protect it from unauthorized access. |
Service Set Identifier, a unique name assigned to a wireless network to distinguish it from others. | A hardware device that allows wireless devices to connect to a wired network using Wi-Fi. |
Frequency Band | Signal Strength |
Client Server | Peer To Peer |
Server | Client |
Centralized | Decentralized |
The power level of the radio signal transmitted between devices in a wireless network, measured in decibels (dBm). | The range of radio frequencies used for wireless communication, such as 2.4 GHz and 5 GHz. |
A network where all devices have equal capabilities and responsibilities, and can directly communicate with each other without a central server. | A network architecture where tasks are divided between servers and clients, with servers providing resources and clients requesting resources. |
A computer or system that requests and utilizes services or resources provided by servers in a network. | A computer or system that provides services or resources to other computers or devices in a network. |
A system or architecture where resources and communication are distributed among multiple devices or nodes without a central authority. | A system or architecture where a central server or authority controls and manages all resources and communication. |
Reliability | Security |
Efficiency | P2P Network |
File Sharing | Distributed Network |
Resource Sharing | Fault Tolerance |
The measures and protocols in place to protect data, resources, and communication from unauthorized access, attacks, and threats. | The ability of a system or network to consistently perform its intended functions accurately and without failure. |
A decentralized network where computers communicate and share resources directly with each other without the need for a central server. | The optimization and effective utilization of resources in a system or network to achieve maximum output with minimal waste or redundancy. |
A network where processing and data storage tasks are spread across multiple computers or servers. | The process of distributing or transferring files from one computer to another over a P2P network. |
The ability of a network to continue operating and functioning properly even when some of its components or nodes fail. | The ability for computers connected in a P2P network to share their computing power, storage space, or other resources. |
Network Speeds | Ping |
Download Speed | Upload Speed |
Throughput | Jitter |
Packet Loss | TCP |
A utility used to test the reachability of a network host and measure the round-trip time for packets. | The rate at which data can be transferred between devices on a network. |
The speed at which data is transferred from a device to the internet. | The speed at which data is transferred from the internet to a device. |
The variation in latency or packet delay on a network. | The actual amount of data that can be transmitted over a network in a given amount of time. |
A network protocol used for reliable communication between devices. | The percentage of data packets that are lost or discarded during transmission on a network. |
UDP | HTTP |
HTTPS | FTP |
SMTP | Pop3 |
IMAP | SSH |
A protocol used for the transmission of data over the internet, often used to retrieve web pages and other resources. | A network protocol used for sending data packets between devices quickly, but without guaranteed reliability. |
A network protocol used for transferring files between devices over the internet. | A protocol used for the secure transmission of data over the internet, often used for online transactions and other sensitive information. |
A protocol used for retrieving email from a server. | A protocol used for sending and receiving email over the internet. |
A protocol used for secure remote access to a device over the internet. | A protocol used for accessing email stored on a server. |
NTP | DHCP |
ARP | IPSEC |
Network Protocol | Handshake |
Standard | Ipv4 |
A protocol used for automatically assigning IP addresses to devices on a network. | A protocol used for synchronizing the time between devices on a network. |
A protocol used for secure communication over the internet, often used for virtual private networks (VPNs). | A protocol used for resolving MAC addresses to IP addresses on a network. |
A process in which two devices establish communication by exchanging predetermined signals or messages. | A set of rules that govern the exchange of data between devices in a network. |
A version of the Internet Protocol that uses a 32-bit address scheme for identifying devices on a network. | A widely accepted and recognized specification or protocol used for uniformity and compatibility. |
Ipv6 | SSL/TLS |
Cryptographic protocols designed to provide secure communication over a computer network. | The most recent version of the Internet Protocol, designed to replace IPv4, using a 128-bit address scheme. |