Networking | Router |
Switch | IP Address |
Protocol | LAN |
WAN | Firewall |
A networking device that forwards data packets between computer networks. | The practice of connecting computers and other devices together to share information and resources. |
A unique numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. | A networking device that forwards packets on network using MAC addresses. |
A computer network that covers a small area, typically within a single building or office. | A set of rules and procedures governing the transmission of data between devices on a computer network. |
A network security device that monitors and filters incoming and outgoing network traffic based on predetermined security rules. | Wide Area Network – a computer network that covers a large geographical area, typically spanning multiple locations and using public or private communication links. |
DNS | Ethernet |
PAN | Network |
Topology | Packet |
Bandwidth | Latency |
A widely used technology for wired LANs that allows devices to communicate with each other. | Domain Name System – a system used to translate human-readable domain names (e.g., www.example.com) into IP addresses (e.g., 192.0.2.1) that computers can understand. |
A group of computers, servers, and devices joined together, enabling communication and the exchange of data. | A network that links devices near an individual, usually employing wireless technologies like Bluetooth. |
A unit of data transmitted over a network comprises a header and payload, which contain the actual information being sent. | The physical or logical arrangement of devices and connections in a network is defined by the organization and structure of network components. |
The time it takes for a data packet to travel from its source to its destination, often measured in milliseconds. | The maximum amount of data that can be transmitted over a network connection in a given amount of time. |
Scalability | Quality Of Service (Qos) |
Traffic Shaping | Internet Of Things |
Fitness Tracking | Wearable Devices |
Smartwatches | Healthcare Monitoring |
The ability of a network to prioritize certain types of traffic or data, ensuring that critical applications or services receive higher priority and better performance. | The ability of a network to easily accommodate an increasing number of users, devices, or data traffic without a significant decrease in performance. |
A network of physical devices, vehicles, appliances, and other objects embedded with sensors, software, and network connectivity, which enables these objects to connect and exchange data. | The process of managing or controlling the flow of network traffic to improve performance, prioritize certain types of traffic, or prevent congestion. |
Electronic devices that can be worn on the body and are equipped with wireless connectivity for personal area network use. | The use of personal area networks to track and monitor fitness-related data, such as steps taken, heart rate, and calories burned. |
The use of personal area networks to monitor and track healthcare-related data, such as blood pressure, glucose levels, and medication adherence. | Wearable devices that have the capability to connect to personal area networks and offer features beyond just timekeeping, such as fitness tracking, notifications, and app integration. |
Personalized Entertainment | Smart Homes |
Location Tracking | Mobile Payments |
Encryption | WLAN |
Wireless Access Point | SSID |
Homes that are equipped with various smart devices and appliances that can be controlled and automated through personal area networks. | The use of personal area networks to deliver personalized entertainment content, such as streaming music, movies, and TV shows to personal devices. |
The use of personal area networks to enable secure and convenient mobile payments using smartphones, wearables, or other personal devices. | The use of personal area networks to track and monitor the location of individuals or objects, often used for navigation, asset tracking, or geofencing. |
A wireless local area network that allows devices to connect and communicate wirelessly within a limited area. | A method used to scramble data using a secret code in order to protect it from unauthorized access. |
Service Set Identifier, a unique name assigned to a wireless network to distinguish it from others. | A hardware device that allows wireless devices to connect to a wired network using Wi-Fi. |
Frequency Band | Signal Strength |
Network Topologies | Bus Topology |
Star Topology | Ring Topology |
Mesh Topology | Tree Topology |
The power level of the radio signal transmitted between devices in a wireless network, measured in decibels (dBm). | The range of radio frequencies used for wireless communication, such as 2.4 GHz and 5 GHz. |
A type of network topology in which all the nodes are connected to a single cable called a bus. | The arrangement of various elements of a computer network, such as computers, servers, routers, switches, etc., and the interconnections between them. |
A type of network topology in which all the nodes are connected in a closed loop. | A type of network topology in which all the nodes are connected to a central device called a hub or switch. |
A type of network topology in which nodes are arranged in a hierarchical structure, resembling a tree. | A type of network topology in which each node is connected to every other node, forming a fully interconnected network. |
Hybrid Topology | Client-Server Topology |
Peer-To-Peer Topology | Fully Connected Topology |
Client Server | Peer To Peer |
Server | Client |
A network topology in which centralized servers or services provide resources and respond to requests from client devices. | A combination of two or more different network topologies, such as star-bus or ring-mesh. |
A network topology in which every node is directly connected to every other node. | A network topology where all the devices or nodes can act as both clients and servers to each other. |
A network where all devices have equal capabilities and responsibilities, and can directly communicate with each other without a central server. | A network architecture where tasks are divided between servers and clients, with servers providing resources and clients requesting resources. |
A computer or system that requests and utilizes services or resources provided by servers in a network. | A computer or system that provides services or resources to other computers or devices in a network. |
Centralized | Decentralized |
Reliability | Security |
Efficiency | P2P Network |
File Sharing | Distributed Network |
A system or architecture where resources and communication are distributed among multiple devices or nodes without a central authority. | A system or architecture where a central server or authority controls and manages all resources and communication. |
The measures and protocols in place to protect data, resources, and communication from unauthorized access, attacks, and threats. | The ability of a system or network to consistently perform its intended functions accurately and without failure. |
A decentralized network where computers communicate and share resources directly with each other without the need for a central server. | The optimization and effective utilization of resources in a system or network to achieve maximum output with minimal waste or redundancy. |
A network where processing and data storage tasks are spread across multiple computers or servers. | The process of distributing or transferring files from one computer to another over a P2P network. |
Resource Sharing | Fault Tolerance |
Network Speeds | Ping |
Download Speed | Upload Speed |
Throughput | Jitter |
The ability of a network to continue operating and functioning properly even when some of its components or nodes fail. | The ability for computers connected in a P2P network to share their computing power, storage space, or other resources. |
A utility used to test the reachability of a network host and measure the round-trip time for packets. | The rate at which data can be transferred between devices on a network. |
The speed at which data is transferred from a device to the internet. | The speed at which data is transferred from the internet to a device. |
The variation in latency or packet delay on a network. | The actual amount of data that can be transmitted over a network in a given amount of time. |
Packet Loss | TCP |
UDP | HTTP |
HTTPS | FTP |
SMTP | Pop3 |
A network protocol used for reliable communication between devices. | The percentage of data packets that are lost or discarded during transmission on a network. |
A protocol used for the transmission of data over the internet, often used to retrieve web pages and other resources. | A network protocol used for sending data packets between devices quickly, but without guaranteed reliability. |
A network protocol used for transferring files between devices over the internet. | A protocol used for the secure transmission of data over the internet, often used for online transactions and other sensitive information. |
A protocol used for retrieving email from a server. | A protocol used for sending and receiving email over the internet. |
IMAP | SSH |
NTP | DHCP |
ARP | IPSEC |
Network Protocol | Handshake |
A protocol used for secure remote access to a device over the internet. | A protocol used for accessing email stored on a server. |
A protocol used for automatically assigning IP addresses to devices on a network. | A protocol used for synchronizing the time between devices on a network. |
A protocol used for secure communication over the internet, often used for virtual private networks (VPNs). | A protocol used for resolving MAC addresses to IP addresses on a network. |
A process in which two devices establish communication by exchanging predetermined signals or messages. | A set of rules that govern the exchange of data between devices in a network. |
Standard | Ipv4 |
Ipv6 | SSL/TLS |
OSI Network Stack | Application Layer |
Presentation Layer | Session Layer |
A version of the Internet Protocol that uses a 32-bit address scheme for identifying devices on a network. | A widely accepted and recognized specification or protocol used for uniformity and compatibility. |
Cryptographic protocols designed to provide secure communication over a computer network. | The most recent version of the Internet Protocol, designed to replace IPv4, using a 128-bit address scheme. |
The topmost layer of the OSI Network Stack, responsible for providing network services to user applications. | A seven layer conceptual framework that defines the functions and protocols for communication between computers in a network. |
The Layer responsible for establishing, maintaining, and terminating connections between network applications. | The Layer responsible for translating data formats and converting data into a standardized format for communication. |
Transport Layer | Network Layer |
Data Link Layer | Physical Layer |
Layered Architecture | Standardization |
Interchangeability | Flexibility |
The Layer responsible for addressing, routing, and forwarding data packets across different networks. | The Layer responsible for reliable and efficient data transfer between end systems, ensuring integrity and flow control. |
The OSI Layer responsible for transmitting raw bit streams over physical media, such as cables or wireless signals. | The Layer responsible for error-free transmission of data frames between adjacent network nodes. |
The process of establishing uniform guidelines and specifications that ensure consistency and compatibility across different systems and technologies. | The design of a network stack where different functions are organized into separate layers, each building on top of the lower layers. |
The ability of a system to adapt and respond to changes or varying requirements without requiring extensive modifications. | The ability of different components or systems to be seamlessly replaced or substituted with one another without causing disruptions or compatibility issues. |
Scalable Architecture | Integration |
Virtual Private Network (VPN) | Tunneling |
VPN Client | Anonymity |
Remote Access VPN | Site-To-Site VPN |
The process of combining different components, systems, or software to work together and function as a unified whole. | A design approach that allows a system to grow in capacity and capability by adding or removing resources easily. |
The process of encapsulating data within a different protocol to ensure its secure transmission over a public network. | A secure and private network connection established over a public network, such as the Internet. |
The state of being unidentifiable or untraceable while using a virtual private network. | Software that enables users to establish a secure connection to a virtual private network. |
A type of VPN that connects two or more networks together, typically used by businesses with multiple locations. | A type of VPN that allows individual users to remotely access a private network over the internet. |
Ipsec VPN | PPTP |
Openvpn | VPN Server |
Storage Area Networks | Fibre Channel |
RAID | Snapshot |
Point-to-Point Tunneling Protocol, a VPN protocol known for its ease of use but considered less secure than others. | A protocol suite used to secure internet communication by authenticating and encrypting each IP packet of a communication session. |
A server that handles the VPN connections and provides secure access to the private network. | An open-source VPN protocol that uses SSL/TLS protocols for secure communication. |
A high-speed network technology commonly used in Storage Area Networks to connect servers and storage devices. | A network that provides consolidated block-level data storage for servers. |
A point-in-time copy of data in a Storage Area Network, used for backup, recovery, or testing purposes. | A data storage technology that combines multiple physical drives into a single logical unit for improved performance, reliability, or both. |
Storage Array | |
Multiple disk drives or solid-state drives managed as a single unit. | |