Networking | Router |
Switch | IP Address |
Protocol | LAN |
WAN | Firewall |
A networking device that forwards data packets between computer networks. | The practice of connecting computers and other devices together to share information and resources. |
A unique numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. | A networking device that forwards packets on network using MAC addresses. |
A computer network that covers a small area, typically within a single building or office. | A set of rules and procedures governing the transmission of data between devices on a computer network. |
A network security device that monitors and filters incoming and outgoing network traffic based on predetermined security rules. | Wide Area Network – a computer network that covers a large geographical area, typically spanning multiple locations and using public or private communication links. |
DNS | Ethernet |
PAN | Network |
Topology | Packet |
Bandwidth | Latency |
A widely used technology for wired LANs that allows devices to communicate with each other. | Domain Name System – a system used to translate human-readable domain names (e.g., www.example.com) into IP addresses (e.g., 192.0.2.1) that computers can understand. |
A group of computers, servers, and devices joined together, enabling communication and the exchange of data. | A network that links devices near an individual, usually employing wireless technologies like Bluetooth. |
A unit of data transmitted over a network comprises a header and payload, which contain the actual information being sent. | The physical or logical arrangement of devices and connections in a network is defined by the organization and structure of network components. |
The time it takes for a data packet to travel from its source to its destination, often measured in milliseconds. | The maximum amount of data that can be transmitted over a network connection in a given amount of time. |
Scalability | Quality Of Service (Qos) |
Traffic Shaping | Internet Of Things |
Fitness Tracking | Wearable Devices |
Smartwatches | Healthcare Monitoring |
The ability of a network to prioritize certain types of traffic or data, ensuring that critical applications or services receive higher priority and better performance. | The ability of a network to easily accommodate an increasing number of users, devices, or data traffic without a significant decrease in performance. |
A network of physical devices, vehicles, appliances, and other objects embedded with sensors, software, and network connectivity, which enables these objects to connect and exchange data. | The process of managing or controlling the flow of network traffic to improve performance, prioritize certain types of traffic, or prevent congestion. |
Electronic devices that can be worn on the body and are equipped with wireless connectivity for personal area network use. | The use of personal area networks to track and monitor fitness-related data, such as steps taken, heart rate, and calories burned. |
The use of personal area networks to monitor and track healthcare-related data, such as blood pressure, glucose levels, and medication adherence. | Wearable devices that have the capability to connect to personal area networks and offer features beyond just timekeeping, such as fitness tracking, notifications, and app integration. |
Personalized Entertainment | Smart Homes |
Location Tracking | Mobile Payments |
Encryption | WLAN |
Wireless Access Point | SSID |
Homes that are equipped with various smart devices and appliances that can be controlled and automated through personal area networks. | The use of personal area networks to deliver personalized entertainment content, such as streaming music, movies, and TV shows to personal devices. |
The use of personal area networks to enable secure and convenient mobile payments using smartphones, wearables, or other personal devices. | The use of personal area networks to track and monitor the location of individuals or objects, often used for navigation, asset tracking, or geofencing. |
A wireless local area network that allows devices to connect and communicate wirelessly within a limited area. | A method used to scramble data using a secret code in order to protect it from unauthorized access. |
Service Set Identifier, a unique name assigned to a wireless network to distinguish it from others. | A hardware device that allows wireless devices to connect to a wired network using Wi-Fi. |
Frequency Band | Signal Strength |
Network Topologies | Bus Topology |
Star Topology | Ring Topology |
Mesh Topology | Tree Topology |
The power level of the radio signal transmitted between devices in a wireless network, measured in decibels (dBm). | The range of radio frequencies used for wireless communication, such as 2.4 GHz and 5 GHz. |
A type of network topology in which all the nodes are connected to a single cable called a bus. | The arrangement of various elements of a computer network, such as computers, servers, routers, switches, etc., and the interconnections between them. |
A type of network topology in which all the nodes are connected in a closed loop. | A type of network topology in which all the nodes are connected to a central device called a hub or switch. |
A type of network topology in which nodes are arranged in a hierarchical structure, resembling a tree. | A type of network topology in which each node is connected to every other node, forming a fully interconnected network. |
Hybrid Topology | Client-Server Topology |
Peer-To-Peer Topology | Fully Connected Topology |
Client Server | Peer To Peer |
Server | Client |
A network topology in which centralized servers or services provide resources and respond to requests from client devices. | A combination of two or more different network topologies, such as star-bus or ring-mesh. |
A network topology in which every node is directly connected to every other node. | A network topology where all the devices or nodes can act as both clients and servers to each other. |
A network where all devices have equal capabilities and responsibilities, and can directly communicate with each other without a central server. | A network architecture where tasks are divided between servers and clients, with servers providing resources and clients requesting resources. |
A computer or system that requests and utilizes services or resources provided by servers in a network. | A computer or system that provides services or resources to other computers or devices in a network. |
Centralized | Decentralized |
Reliability | Security |
Efficiency | P2P Network |
File Sharing | Distributed Network |
A system or architecture where resources and communication are distributed among multiple devices or nodes without a central authority. | A system or architecture where a central server or authority controls and manages all resources and communication. |
The measures and protocols in place to protect data, resources, and communication from unauthorized access, attacks, and threats. | The ability of a system or network to consistently perform its intended functions accurately and without failure. |
A decentralized network where computers communicate and share resources directly with each other without the need for a central server. | The optimization and effective utilization of resources in a system or network to achieve maximum output with minimal waste or redundancy. |
A network where processing and data storage tasks are spread across multiple computers or servers. | The process of distributing or transferring files from one computer to another over a P2P network. |
Resource Sharing | Fault Tolerance |
Network Speeds | Ping |
Download Speed | Upload Speed |
Throughput | Jitter |
The ability of a network to continue operating and functioning properly even when some of its components or nodes fail. | The ability for computers connected in a P2P network to share their computing power, storage space, or other resources. |
A utility used to test the reachability of a network host and measure the round-trip time for packets. | The rate at which data can be transferred between devices on a network. |
The speed at which data is transferred from a device to the internet. | The speed at which data is transferred from the internet to a device. |
The variation in latency or packet delay on a network. | The actual amount of data that can be transmitted over a network in a given amount of time. |
Packet Loss | TCP |
UDP | HTTP |
HTTPS | FTP |
SMTP | Pop3 |
A network protocol used for reliable communication between devices. | The percentage of data packets that are lost or discarded during transmission on a network. |
A protocol used for the transmission of data over the internet, often used to retrieve web pages and other resources. | A network protocol used for sending data packets between devices quickly, but without guaranteed reliability. |
A network protocol used for transferring files between devices over the internet. | A protocol used for the secure transmission of data over the internet, often used for online transactions and other sensitive information. |
A protocol used for retrieving email from a server. | A protocol used for sending and receiving email over the internet. |
IMAP | SSH |
NTP | DHCP |
ARP | IPSEC |
Network Protocol | Handshake |
A protocol used for secure remote access to a device over the internet. | A protocol used for accessing email stored on a server. |
A protocol used for automatically assigning IP addresses to devices on a network. | A protocol used for synchronizing the time between devices on a network. |
A protocol used for secure communication over the internet, often used for virtual private networks (VPNs). | A protocol used for resolving MAC addresses to IP addresses on a network. |
A process in which two devices establish communication by exchanging predetermined signals or messages. | A set of rules that govern the exchange of data between devices in a network. |
Standard | Ipv4 |
Ipv6 | SSL/TLS |
Network Stacks | Layers |
Data Link Layer | Network Layer |
A version of the Internet Protocol that uses a 32-bit address scheme for identifying devices on a network. | A widely accepted and recognized specification or protocol used for uniformity and compatibility. |
Cryptographic protocols designed to provide secure communication over a computer network. | The most recent version of the Internet Protocol, designed to replace IPv4, using a 128-bit address scheme. |
In the context of network communication, different levels or modules compose the network protocol stack. | A collection of protocols and technologies employed to establish network communication. |
The layer responsible for routing of packets across networks. | The bottommost layer in the TCP/IP network stack responsible for physical transfer of bit streams. |
Transport Layer | Application Layer |
Network Stack | TCP/IP |
Routing | Interoperability |
Interchangeability | Evolvability |
The layer responsible for transforming data into the suitable format for application processing, including encryption and compression. | The layer responsible for ensuring data is delivered reliably and sequentially between hosts, providing end-to-end transmission. |
TCP/IP is a fundamental network protocol suite that provides reliable and efficient transmission of data over networks. | The set of network protocols and software that enable communication between devices on a computer network. |
Interoperability is the ability of different network stacks, devices, or systems to seamlessly exchange and interpret data. | The process of determining the optimal path for data packets to travel from the source to the destination in a network. |
The ability of a system or software to adapt over time to meet changing requirements. | The capability of substituting one component or system with another that performs the same function. |
Frames | Packets |
Segments | Payload |
Header | Checksum |
Fragmentation | TTL (Time To Live) |
Blocks of data contain source and destination IP addresses that are routed through a network. | The units of data transmission in computer networks used to organize and encapsulate data for transmission. |
The data portion of a packet or frame that carries the actual information being transmitted. | Units of data transmission in transport layer protocols, such as TCP. |
A value used to verify the integrity of data during transmission. | A section of data that precedes the actual payload and contains control information. |
A field that determines the lifetime of data in a network, preventing it from circulating indefinitely. | The process of breaking down a large packet into smaller ones to fit the maximum transmission unit of a network. |
Version | Header Length |
Type Of Service | Total Length |
Identification | Flags |
Fragment Offset | Time To Live |
Specifies the length of the header in 32-bit words. | Indicates the version of the Internet Protocol being used. |
Indicates the entire packet size, including both header and data, in bytes. | Provides an indication of the abstract parameters of the quality of service desired. |
Used to control or identify fragments of the packet. | A unique value used to identify the packet, primarily for reassembly purposes. |
Specifies the maximum time the packet is allowed to remain in the network. | Indicates the position of the fragment in the original packet. |
Header Checksum | Source Address |
Destination Address | |
Specifies the IP address of the sender of the packet. | Used for error-checking the header to ensure data integrity. |
Specifies the IP address of the intended recipient of the packet. | |