Networking Router
Switch IP Address
Protocol LAN
WAN Firewall

 

A networking device that forwards data packets between computer networks. The practice of connecting computers and other devices together to share information and resources.
A unique numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. A networking device that forwards packets on network using MAC addresses.
A computer network that covers a small area, typically within a single building or office. A set of rules and procedures governing the transmission of data between devices on a computer network.
A network security device that monitors and filters incoming and outgoing network traffic based on predetermined security rules. Wide Area Network – a computer network that covers a large geographical area, typically spanning multiple locations and using public or private communication links.

 

DNS Ethernet
PAN Network
Topology Packet
Bandwidth Latency

 

A widely used technology for wired LANs that allows devices to communicate with each other. Domain Name System – a system used to translate human-readable domain names (e.g., www.example.com) into IP addresses (e.g., 192.0.2.1) that computers can understand.
A group of computers, servers, and devices joined together, enabling communication and the exchange of data. A network that links devices near an individual, usually employing wireless technologies like Bluetooth.
A unit of data transmitted over a network comprises a header and payload, which contain the actual information being sent. The physical or logical arrangement of devices and connections in a network is defined by the organization and structure of network components.
The time it takes for a data packet to travel from its source to its destination, often measured in milliseconds. The maximum amount of data that can be transmitted over a network connection in a given amount of time.

 

Scalability Quality Of Service (Qos)
Traffic Shaping Internet Of Things
Fitness Tracking Wearable Devices
Smartwatches Healthcare Monitoring

 

The ability of a network to prioritize certain types of traffic or data, ensuring that critical applications or services receive higher priority and better performance. The ability of a network to easily accommodate an increasing number of users, devices, or data traffic without a significant decrease in performance.
A network of physical devices, vehicles, appliances, and other objects embedded with sensors, software, and network connectivity, which enables these objects to connect and exchange data. The process of managing or controlling the flow of network traffic to improve performance, prioritize certain types of traffic, or prevent congestion.
Electronic devices that can be worn on the body and are equipped with wireless connectivity for personal area network use. The use of personal area networks to track and monitor fitness-related data, such as steps taken, heart rate, and calories burned.
The use of personal area networks to monitor and track healthcare-related data, such as blood pressure, glucose levels, and medication adherence. Wearable devices that have the capability to connect to personal area networks and offer features beyond just timekeeping, such as fitness tracking, notifications, and app integration.

 

Personalized Entertainment Smart Homes
Location Tracking Mobile Payments
Encryption WLAN
Wireless Access Point SSID

 

Homes that are equipped with various smart devices and appliances that can be controlled and automated through personal area networks. The use of personal area networks to deliver personalized entertainment content, such as streaming music, movies, and TV shows to personal devices.
The use of personal area networks to enable secure and convenient mobile payments using smartphones, wearables, or other personal devices. The use of personal area networks to track and monitor the location of individuals or objects, often used for navigation, asset tracking, or geofencing.
A wireless local area network that allows devices to connect and communicate wirelessly within a limited area. A method used to scramble data using a secret code in order to protect it from unauthorized access.
Service Set Identifier, a unique name assigned to a wireless network to distinguish it from others. A hardware device that allows wireless devices to connect to a wired network using Wi-Fi.

 

Frequency Band Signal Strength
Network Topologies Bus Topology
Star Topology Ring Topology
Mesh Topology Tree Topology

 

The power level of the radio signal transmitted between devices in a wireless network, measured in decibels (dBm). The range of radio frequencies used for wireless communication, such as 2.4 GHz and 5 GHz.
A type of network topology in which all the nodes are connected to a single cable called a bus. The arrangement of various elements of a computer network, such as computers, servers, routers, switches, etc., and the interconnections between them.
A type of network topology in which all the nodes are connected in a closed loop. A type of network topology in which all the nodes are connected to a central device called a hub or switch.
A type of network topology in which nodes are arranged in a hierarchical structure, resembling a tree. A type of network topology in which each node is connected to every other node, forming a fully interconnected network.

 

Hybrid Topology Client-Server Topology
Peer-To-Peer Topology Fully Connected Topology
Client Server Peer To Peer
Server Client

 

A network topology in which centralized servers or services provide resources and respond to requests from client devices. A combination of two or more different network topologies, such as star-bus or ring-mesh.
A network topology in which every node is directly connected to every other node. A network topology where all the devices or nodes can act as both clients and servers to each other.
A network where all devices have equal capabilities and responsibilities, and can directly communicate with each other without a central server. A network architecture where tasks are divided between servers and clients, with servers providing resources and clients requesting resources.
A computer or system that requests and utilizes services or resources provided by servers in a network. A computer or system that provides services or resources to other computers or devices in a network.

 

Centralized Decentralized
Reliability Security
Efficiency P2P Network
File Sharing Distributed Network

 

A system or architecture where resources and communication are distributed among multiple devices or nodes without a central authority. A system or architecture where a central server or authority controls and manages all resources and communication.
The measures and protocols in place to protect data, resources, and communication from unauthorized access, attacks, and threats. The ability of a system or network to consistently perform its intended functions accurately and without failure.
A decentralized network where computers communicate and share resources directly with each other without the need for a central server. The optimization and effective utilization of resources in a system or network to achieve maximum output with minimal waste or redundancy.
A network where processing and data storage tasks are spread across multiple computers or servers. The process of distributing or transferring files from one computer to another over a P2P network.

 

Resource Sharing Fault Tolerance
Network Speeds Ping
Download Speed Upload Speed
Throughput Jitter

 

The ability of a network to continue operating and functioning properly even when some of its components or nodes fail. The ability for computers connected in a P2P network to share their computing power, storage space, or other resources.
A utility used to test the reachability of a network host and measure the round-trip time for packets. The rate at which data can be transferred between devices on a network.
The speed at which data is transferred from a device to the internet. The speed at which data is transferred from the internet to a device.
The variation in latency or packet delay on a network. The actual amount of data that can be transmitted over a network in a given amount of time.

 

Packet Loss TCP
UDP HTTP
HTTPS FTP
SMTP Pop3

 

A network protocol used for reliable communication between devices. The percentage of data packets that are lost or discarded during transmission on a network.
A protocol used for the transmission of data over the internet, often used to retrieve web pages and other resources. A network protocol used for sending data packets between devices quickly, but without guaranteed reliability.
A network protocol used for transferring files between devices over the internet. A protocol used for the secure transmission of data over the internet, often used for online transactions and other sensitive information.
A protocol used for retrieving email from a server. A protocol used for sending and receiving email over the internet.

 

IMAP SSH
NTP DHCP
ARP IPSEC
Network Protocol Handshake

 

A protocol used for secure remote access to a device over the internet. A protocol used for accessing email stored on a server.
A protocol used for automatically assigning IP addresses to devices on a network. A protocol used for synchronizing the time between devices on a network.
A protocol used for secure communication over the internet, often used for virtual private networks (VPNs). A protocol used for resolving MAC addresses to IP addresses on a network.
A process in which two devices establish communication by exchanging predetermined signals or messages. A set of rules that govern the exchange of data between devices in a network.

 

Standard Ipv4
Ipv6 SSL/TLS
Network Stacks Layers
Data Link Layer Network Layer

 

A version of the Internet Protocol that uses a 32-bit address scheme for identifying devices on a network. A widely accepted and recognized specification or protocol used for uniformity and compatibility.
Cryptographic protocols designed to provide secure communication over a computer network. The most recent version of the Internet Protocol, designed to replace IPv4, using a 128-bit address scheme.
In the context of network communication, different levels or modules compose the network protocol stack. A collection of protocols and technologies employed to establish network communication.
The layer responsible for routing of packets across networks. The bottommost layer in the TCP/IP network stack responsible for physical transfer of bit streams.

 

Transport Layer Application Layer
Network Stack TCP/IP
Routing Interoperability
Interchangeability Evolvability

 

The layer responsible for transforming data into the suitable format for application processing, including encryption and compression. The layer responsible for ensuring data is delivered reliably and sequentially between hosts, providing end-to-end transmission.
TCP/IP is a fundamental network protocol suite that provides reliable and efficient transmission of data over networks. The set of network protocols and software that enable communication between devices on a computer network.
Interoperability is the ability of different network stacks, devices, or systems to seamlessly exchange and interpret data. The process of determining the optimal path for data packets to travel from the source to the destination in a network.
The ability of a system or software to adapt over time to meet changing requirements. The capability of substituting one component or system with another that performs the same function.

 

Frames Packets
Segments Payload
Header Checksum
Fragmentation TTL (Time To Live)

 

Blocks of data contain source and destination IP addresses that are routed through a network. The units of data transmission in computer networks used to organize and encapsulate data for transmission.
The data portion of a packet or frame that carries the actual information being transmitted. Units of data transmission in transport layer protocols, such as TCP.
A value used to verify the integrity of data during transmission. A section of data that precedes the actual payload and contains control information.
A field that determines the lifetime of data in a network, preventing it from circulating indefinitely. The process of breaking down a large packet into smaller ones to fit the maximum transmission unit of a network.

 

Version Header Length
Type Of Service Total Length
Identification Flags
Fragment Offset Time To Live

 

Specifies the length of the header in 32-bit words. Indicates the version of the Internet Protocol being used.
Indicates the entire packet size, including both header and data, in bytes. Provides an indication of the abstract parameters of the quality of service desired.
Used to control or identify fragments of the packet. A unique value used to identify the packet, primarily for reassembly purposes.
Specifies the maximum time the packet is allowed to remain in the network. Indicates the position of the fragment in the original packet.

 

Header Checksum Source Address
Destination Address

 

Specifies the IP address of the sender of the packet. Used for error-checking the header to ensure data integrity.
Specifies the IP address of the intended recipient of the packet.