Networking Router
Switch IP Address
Protocol LAN
WAN Firewall

 

A networking device that forwards data packets between computer networks. The practice of connecting computers and other devices together to share information and resources.
A unique numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. A networking device that forwards packets on network using MAC addresses.
A computer network that covers a small area, typically within a single building or office. A set of rules and procedures governing the transmission of data between devices on a computer network.
A network security device that monitors and filters incoming and outgoing network traffic based on predetermined security rules. Wide Area Network – a computer network that covers a large geographical area, typically spanning multiple locations and using public or private communication links.

 

DNS Ethernet
PAN Network
Topology Packet
Bandwidth Latency

 

A widely used technology for wired LANs that allows devices to communicate with each other. Domain Name System – a system used to translate human-readable domain names (e.g., www.example.com) into IP addresses (e.g., 192.0.2.1) that computers can understand.
A group of computers, servers, and devices joined together, enabling communication and the exchange of data. A network that links devices near an individual, usually employing wireless technologies like Bluetooth.
A unit of data transmitted over a network comprises a header and payload, which contain the actual information being sent. The physical or logical arrangement of devices and connections in a network is defined by the organization and structure of network components.
The time it takes for a data packet to travel from its source to its destination, often measured in milliseconds. The maximum amount of data that can be transmitted over a network connection in a given amount of time.

 

Scalability Quality Of Service (Qos)
Traffic Shaping Internet Of Things
Fitness Tracking Wearable Devices
Smartwatches Healthcare Monitoring

 

The ability of a network to prioritize certain types of traffic or data, ensuring that critical applications or services receive higher priority and better performance. The ability of a network to easily accommodate an increasing number of users, devices, or data traffic without a significant decrease in performance.
A network of physical devices, vehicles, appliances, and other objects embedded with sensors, software, and network connectivity, which enables these objects to connect and exchange data. The process of managing or controlling the flow of network traffic to improve performance, prioritize certain types of traffic, or prevent congestion.
Electronic devices that can be worn on the body and are equipped with wireless connectivity for personal area network use. The use of personal area networks to track and monitor fitness-related data, such as steps taken, heart rate, and calories burned.
The use of personal area networks to monitor and track healthcare-related data, such as blood pressure, glucose levels, and medication adherence. Wearable devices that have the capability to connect to personal area networks and offer features beyond just timekeeping, such as fitness tracking, notifications, and app integration.

 

Personalized Entertainment Smart Homes
Location Tracking Mobile Payments
Encryption WLAN
Wireless Access Point SSID

 

Homes that are equipped with various smart devices and appliances that can be controlled and automated through personal area networks. The use of personal area networks to deliver personalized entertainment content, such as streaming music, movies, and TV shows to personal devices.
The use of personal area networks to enable secure and convenient mobile payments using smartphones, wearables, or other personal devices. The use of personal area networks to track and monitor the location of individuals or objects, often used for navigation, asset tracking, or geofencing.
A wireless local area network that allows devices to connect and communicate wirelessly within a limited area. A method used to scramble data using a secret code in order to protect it from unauthorized access.
Service Set Identifier, a unique name assigned to a wireless network to distinguish it from others. A hardware device that allows wireless devices to connect to a wired network using Wi-Fi.

 

Frequency Band Signal Strength
Network Topologies Bus Topology
Star Topology Ring Topology
Mesh Topology Tree Topology

 

The power level of the radio signal transmitted between devices in a wireless network, measured in decibels (dBm). The range of radio frequencies used for wireless communication, such as 2.4 GHz and 5 GHz.
A type of network topology in which all the nodes are connected to a single cable called a bus. The arrangement of various elements of a computer network, such as computers, servers, routers, switches, etc., and the interconnections between them.
A type of network topology in which all the nodes are connected in a closed loop. A type of network topology in which all the nodes are connected to a central device called a hub or switch.
A type of network topology in which nodes are arranged in a hierarchical structure, resembling a tree. A type of network topology in which each node is connected to every other node, forming a fully interconnected network.

 

Hybrid Topology Client-Server Topology
Peer-To-Peer Topology Fully Connected Topology
Client Server Peer To Peer
Server Client

 

A network topology in which centralized servers or services provide resources and respond to requests from client devices. A combination of two or more different network topologies, such as star-bus or ring-mesh.
A network topology in which every node is directly connected to every other node. A network topology where all the devices or nodes can act as both clients and servers to each other.
A network where all devices have equal capabilities and responsibilities, and can directly communicate with each other without a central server. A network architecture where tasks are divided between servers and clients, with servers providing resources and clients requesting resources.
A computer or system that requests and utilizes services or resources provided by servers in a network. A computer or system that provides services or resources to other computers or devices in a network.

 

Centralized Decentralized
Reliability Security
Efficiency P2P Network
File Sharing Distributed Network

 

A system or architecture where resources and communication are distributed among multiple devices or nodes without a central authority. A system or architecture where a central server or authority controls and manages all resources and communication.
The measures and protocols in place to protect data, resources, and communication from unauthorized access, attacks, and threats. The ability of a system or network to consistently perform its intended functions accurately and without failure.
A decentralized network where computers communicate and share resources directly with each other without the need for a central server. The optimization and effective utilization of resources in a system or network to achieve maximum output with minimal waste or redundancy.
A network where processing and data storage tasks are spread across multiple computers or servers. The process of distributing or transferring files from one computer to another over a P2P network.

 

Resource Sharing Fault Tolerance
Network Speeds Ping
Download Speed Upload Speed
Throughput Jitter

 

The ability of a network to continue operating and functioning properly even when some of its components or nodes fail. The ability for computers connected in a P2P network to share their computing power, storage space, or other resources.
A utility used to test the reachability of a network host and measure the round-trip time for packets. The rate at which data can be transferred between devices on a network.
The speed at which data is transferred from a device to the internet. The speed at which data is transferred from the internet to a device.
The variation in latency or packet delay on a network. The actual amount of data that can be transmitted over a network in a given amount of time.

 

Packet Loss TCP
UDP HTTP
HTTPS FTP
SMTP Pop3

 

A network protocol used for reliable communication between devices. The percentage of data packets that are lost or discarded during transmission on a network.
A protocol used for the transmission of data over the internet, often used to retrieve web pages and other resources. A network protocol used for sending data packets between devices quickly, but without guaranteed reliability.
A network protocol used for transferring files between devices over the internet. A protocol used for the secure transmission of data over the internet, often used for online transactions and other sensitive information.
A protocol used for retrieving email from a server. A protocol used for sending and receiving email over the internet.

 

IMAP SSH
NTP DHCP
ARP IPSEC
Network Protocol Handshake

 

A protocol used for secure remote access to a device over the internet. A protocol used for accessing email stored on a server.
A protocol used for automatically assigning IP addresses to devices on a network. A protocol used for synchronizing the time between devices on a network.
A protocol used for secure communication over the internet, often used for virtual private networks (VPNs). A protocol used for resolving MAC addresses to IP addresses on a network.
A process in which two devices establish communication by exchanging predetermined signals or messages. A set of rules that govern the exchange of data between devices in a network.

 

Standard Ipv4
Ipv6 SSL/TLS
OSI Network Stack Application Layer
Presentation Layer Session Layer

 

A version of the Internet Protocol that uses a 32-bit address scheme for identifying devices on a network. A widely accepted and recognized specification or protocol used for uniformity and compatibility.
Cryptographic protocols designed to provide secure communication over a computer network. The most recent version of the Internet Protocol, designed to replace IPv4, using a 128-bit address scheme.
The topmost layer of the OSI Network Stack, responsible for providing network services to user applications. A seven layer conceptual framework that defines the functions and protocols for communication between computers in a network.
The Layer responsible for establishing, maintaining, and terminating connections between network applications. The Layer responsible for translating data formats and converting data into a standardized format for communication.

 

Transport Layer Network Layer
Data Link Layer Physical Layer
Layered Architecture Standardization
Interchangeability Flexibility

 

The Layer responsible for addressing, routing, and forwarding data packets across different networks. The Layer responsible for reliable and efficient data transfer between end systems, ensuring integrity and flow control.
The OSI Layer responsible for transmitting raw bit streams over physical media, such as cables or wireless signals. The Layer responsible for error-free transmission of data frames between adjacent network nodes.
The process of establishing uniform guidelines and specifications that ensure consistency and compatibility across different systems and technologies. The design of a network stack where different functions are organized into separate layers, each building on top of the lower layers.
The ability of a system to adapt and respond to changes or varying requirements without requiring extensive modifications. The ability of different components or systems to be seamlessly replaced or substituted with one another without causing disruptions or compatibility issues.

 

Scalable Architecture Integration
Virtual Private Network (VPN) Tunneling
VPN Client Anonymity
Remote Access VPN Site-To-Site VPN

 

The process of combining different components, systems, or software to work together and function as a unified whole. A design approach that allows a system to grow in capacity and capability by adding or removing resources easily.
The process of encapsulating data within a different protocol to ensure its secure transmission over a public network. A secure and private network connection established over a public network, such as the Internet.
The state of being unidentifiable or untraceable while using a virtual private network. Software that enables users to establish a secure connection to a virtual private network.
A type of VPN that connects two or more networks together, typically used by businesses with multiple locations. A type of VPN that allows individual users to remotely access a private network over the internet.

 

Ipsec VPN PPTP
Openvpn VPN Server
Storage Area Networks Fibre Channel
RAID Snapshot

 

Point-to-Point Tunneling Protocol, a VPN protocol known for its ease of use but considered less secure than others. A protocol suite used to secure internet communication by authenticating and encrypting each IP packet of a communication session.
A server that handles the VPN connections and provides secure access to the private network. An open-source VPN protocol that uses SSL/TLS protocols for secure communication.
A high-speed network technology commonly used in Storage Area Networks to connect servers and storage devices. A network that provides consolidated block-level data storage for servers.
A point-in-time copy of data in a Storage Area Network, used for backup, recovery, or testing purposes. A data storage technology that combines multiple physical drives into a single logical unit for improved performance, reliability, or both.

 

Storage Array

 

Multiple disk drives or solid-state drives managed as a single unit.