Networking - 100 Terms

Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

100 Terms Module 2

25 December 2023 14:49

1. ARP (Address Resolution Protocol): ARP is a networking protocol used to map an IP address to a physical machine address (MAC
address) in a local network.
2. TCP/IP (Transmission Control Protocol/Internet Protocol): TCP/IP is a suite of communication protocols that facilitates data
transmission between devices on a network, forming the basis of the Internet.
3. DNS (Domain Name System): DNS is a system that translates human-readable domain names into IP addresses, enabling users to
access websites using easily remembered names.
4. LAN (Local Area Network): A LAN is a network that connects computers and devices within a limited geographic area, such as a
home, office, or campus.
5. WAN (Wide Area Network): A WAN is a network that spans a larger geographical area, connecting multiple LANs and facilitating long-
distance communication.
6. Router: A router is a networking device that forwards data packets between computer networks, ensuring efficient data
transmission.
7. Firewall: A firewall is a security device or software that monitors and controls incoming and outgoing network traffic, protecting a
network from unauthorized access or cyber threats.
8. VPN (Virtual Private Network): A VPN is a secure network connection that allows users to access a private network over the
Internet, ensuring data confidentiality and privacy.
9. Subnet: A subnet is a logical subdivision of an IP network, allowing for efficient management and organization of IP addresses.
10. Gateway: A gateway is a device that connects different networks, facilitating communication between them and enabling data
transfer.
11. Switch: A switch is a networking device that operates at the data link layer, connecting devices within the same network and using
MAC addresses to forward data.
12. HTTP (Hypertext Transfer Protocol): HTTP is a protocol used for transferring hypertext requests and information on the World Wide
Web.
13. HTTPS (Hypertext Transfer Protocol Secure): HTTPS is a secure version of HTTP that encrypts data transmission, providing a secure
connection for online communication.
14. IP Address (Internet Protocol Address): An IP address is a numerical label assigned to each device connected to a computer
network, serving two main functions: host or network interface identification and location addressing.
15. MAC Address (Media Access Control Address): A MAC address is a unique identifier assigned to network interfaces for
communication at the data link layer of a network.
16. FTP (File Transfer Protocol): FTP is a standard network protocol used to transfer files from one host to another over a TCP-based
network, such as the Internet.
17. DHCP (Dynamic Host Configuration Protocol): DHCP is a network protocol that automatically assigns IP addresses and other
network configuration information to devices on a network.
18. SNMP (Simple Network Management Protocol): SNMP is a protocol used to manage and monitor network devices, allowing
administrators to collect information and control network activities.
19. Bandwidth: Bandwidth refers to the maximum rate of data transfer across a network, typically measured in bits per second (bps).
20. Latency: Latency is the time delay between the initiation of a network request and the receipt of the corresponding response,
influencing the responsiveness of a network.
21. Packet: A packet is a unit of data transmitted over a network, consisting of a header and payload that contains the actual data being
transferred.
22. Gateway: A gateway is a device that connects different networks, facilitating communication between them and enabling data
transfer.
23. Load Balancing: Load balancing is the distribution of network traffic or workload across multiple servers or network paths to ensure
optimal resource utilization and prevent congestion.
24. Proxy Server: A proxy server acts as an intermediary between client devices and the Internet, forwarding requests and managing
responses to enhance security and performance.
25. SMTP (Simple Mail Transfer Protocol): SMTP is a protocol used for sending email messages between servers, facilitating the
communication of electronic mail.
26. POP3 (Post Office Protocol 3): POP3 is a protocol used by email clients to retrieve messages from a mail server, allowing users to
download their emails to their devices.
27. LAN Cable: LAN cable, also known as Ethernet cable, is a type of cable used to connect devices within a local area network for data
transmission.
28. NAT (Network Address Translation): NAT is a technique that modifies network address information in packet headers while in
transit, allowing multiple devices on a local network to share a single public IP address.
29. IPv6 (Internet Protocol version 6): IPv6 is the most recent version of the Internet Protocol, designed to address the limitations of
IPv4 by providing a larger address space.
30. Ping: Ping is a network utility tool used to test the reachability of a host on an Internet Protocol (IP) network and measure the round-
trip time for messages to travel from the source to the destination.
31. ICMP (Internet Control Message Protocol): ICMP is a network layer protocol used to send error messages and operational
information about network conditions, commonly associated with the Ping utility.
32. SSL/TLS (Secure Sockets Layer/Transport Layer Security): SSL and TLS are cryptographic protocols that provide secure
communication over a computer network, commonly used for securing web transactions.
33. Proxy Server: A proxy server acts as an intermediary between client devices and the Internet, forwarding requests and managing
responses to enhance security and performance.
34. MAC Spoofing: MAC spoofing is a technique where an attacker changes the Media Access Control (MAC) address of their device to
impersonate another device on the network.
35. Port Forwarding: Port forwarding is the process of redirecting communication requests from one IP address and port number
combination to another, often used to enable remote access to a device or service.
36. VLAN (Virtual Local Area Network): VLAN is a network segmentation technique that divides a physical LAN into multiple logical
LANs, improving network efficiency and security.
37. DNS Spoofing: DNS spoofing is an attack where the DNS server's responses are altered to redirect traffic to a malicious website,
leading users to unintended destinations.
38. Routing Table: A routing table is a data table stored in a router or networked device that lists routes to particular network
destinations, helping in the decision-making process for packet forwarding.
39. Traceroute: Traceroute is a diagnostic tool that traces the route that packets take from one networked device to another, showing
the sequence of routers crossed during transmission.
40. QoS (Quality of Service): QoS is a set of technologies and policies that prioritize and manage network traffic to ensure a certain level
of performance, particularly in terms of latency and bandwidth.
41. NAT (Network Address Translation): NAT is a technique that modifies network address information in packet headers while in
transit, allowing multiple devices on a local network to share a single public IP address.
42. Wireless Access Point (WAP): A WAP is a device that allows wireless communication devices to connect to a wired network using Wi-
Fi, providing access to the network and the Internet.
43. IPv4 (Internet Protocol version 4): IPv4 is the fourth version of the Internet Protocol and is the most widely used, employing a 32-bit
address scheme.
44. IPv4 Address Exhaustion: IPv4 address exhaustion refers to the depletion of available IPv4 addresses due to the increasing number
of devices connected to the Internet.
45. Default Gateway: A default gateway is the device or node on a network that serves as an entry or exit point for data traffic not
destined for a local address.
46. FTP (File Transfer Protocol): FTP is a standard network protocol used to transfer files from one host to another over a TCP-based
network, such as the Internet.
47. Telnet: Telnet is a protocol that allows users to access and control remote computers over a network, providing a command-line
interface.
48. IP Spoofing: IP spoofing is a technique where an attacker sends IP packets from a false (or "spoofed") source address to deceive the
recipient about the origin of the message.
49. Network Protocol Analyzer: A network protocol analyzer, often known as a packet sniffer, is a tool used to capture and analyze
network traffic for troubleshooting, diagnostics, or security purposes.
50. EIGRP (Enhanced Interior Gateway Routing Protocol): EIGRP is a routing protocol used in computer networks to efficiently
exchange routing and topology information among routers.
51. Ping of Death: Ping of Death is a type of cyber attack that involves sending a malformed or oversized ping packet to a target system,
causing it to crash or become unresponsive.
52. Wi-Fi (Wireless Fidelity): Wi-Fi is a technology that allows devices to connect to a wireless local area network (WLAN) using the 802.11
standard.
53. RADIUS (Remote Authentication Dial-In User Service): RADIUS is a networking protocol that provides centralized authentication,
authorization, and accounting management for users attempting to access a network service.
54. Hub: A hub is a basic networking device that connects multiple devices in a LAN, operating at the physical layer and broadcasting data
to all connected devices.
55. EAP (Extensible Authentication Protocol): EAP is an authentication framework commonly used in wireless networks and point-to-
point connections, providing support for various authentication methods.
56. Firmware: Firmware is a type of software embedded in networking devices and hardware, responsible for managing the device's
functionality and behavior.
57. PoE (Power over Ethernet): PoE is a technology that enables the simultaneous transmission of data and electrical power over an
Ethernet cable, often used to power IP cameras and VoIP phones.
58. MPLS (Multiprotocol Label Switching): MPLS is a protocol for efficient packet forwarding in a network, commonly used in service
provider networks to improve traffic flow.
59. Frame Relay: Frame Relay is a packet-switching technology used for connecting devices in a wide area network (WAN), providing cost-
effective data transmission.
60. Jitter: Jitter is the variation in the delay of received packets, affecting the quality of real-time communication such as voice over IP
(VoIP) calls.
61. SMTP (Simple Mail Transfer Protocol): SMTP is a protocol used for sending email messages between servers, facilitating the
communication of electronic mail.
62. POP3 (Post Office Protocol 3): POP3 is a protocol used by email clients to retrieve messages from a mail server, allowing users to
download their emails to their devices.
63. SSH (Secure Shell): SSH is a cryptographic network protocol that provides a secure way to access and manage network devices
remotely.
64. NAT (Network Address Translation): NAT is a technique that modifies network address information in packet headers while in
transit, allowing multiple devices on a local network to share a single public IP address.
65. IPv6 (Internet Protocol version 6): IPv6 is the most recent version of the Internet Protocol, designed to address the limitations of
IPv4 by providing a larger address space.
66. Ping: Ping is a network utility tool used to test the reachability of a host on an Internet Protocol (IP) network and measure the round-
trip time for messages to travel from the source to the destination.
67. BGP (Border Gateway Protocol): BGP is an exterior gateway protocol that manages how routers communicate and exchange
information on the Internet, facilitating the selection of optimal paths for data transmission.
68. VoIP (Voice over Internet Protocol): VoIP is a technology that enables voice communication and multimedia sessions over the
Internet, converting analog audio signals into digital data for transmission.
69. MAC Filtering: MAC filtering is a security feature that controls access to a network by allowing or denying entry based on the Media
Access Control (MAC) addresses of devices.
70. SSL Certificate: An SSL certificate is a digital certificate that authenticates the identity of a website and encrypts information
exchanged between the user's browser and the server.
71. SSID (Service Set Identifier): SSID is a unique name assigned to a wireless network, allowing devices to identify and connect to the
correct network.
72. ICANN (Internet Corporation for Assigned Names and Numbers): ICANN is a nonprofit organization responsible for coordinating
the maintenance and procedures of several databases related to the namespaces and numerical spaces of the Internet.
73. IPsec (Internet Protocol Security): IPsec is a suite of protocols that provides security for Internet Protocol (IP) communications by
authenticating and encrypting each IP packet in a communication session.
74. Token Ring: Token Ring is a local area network (LAN) technology where devices are connected in a physical ring or star topology, and
a token-passing protocol manages access to the network.
75. P2P (Peer-to-Peer): P2P refers to a decentralized network architecture where devices communicate directly with each other without
the need for a central server.
76. WEP (Wired Equivalent Privacy): WEP is a security protocol designed to provide a wireless local area network (WLAN) with a level of
security and privacy comparable to what is usually expected of a wired LAN.
77. WPA (Wi-Fi Protected Access): WPA is a security protocol designed to secure wireless computer networks, providing a higher level of
security than WEP.
78. SSID Broadcasting: SSID broadcasting is the process by which a wireless access point broadcasts its SSID to make it visible to nearby
devices, allowing them to connect to the network.
79. RJ45 Connector: The RJ45 connector is a standardized physical interface used for connecting Ethernet cables to network devices such
as computers, routers, and switches.
80. MAN (Metropolitan Area Network): A MAN is a network that covers a larger geographic area than a local area network (LAN) but is
smaller than a wide area network (WAN), typically covering a city.
81. Network Topology: Network topology refers to the arrangement of elements within a computer network, including the physical
layout and the pattern of connections between network nodes.
82. Multiplexing: Multiplexing is a technique that combines multiple data streams into a single channel for transmission over a
communication medium, optimizing bandwidth usage.
83. CRC (Cyclic Redundancy Check): CRC is an error-checking technique used in network communication to detect changes to raw data,
ensuring data integrity during transmission.
84. DNS Cache Poisoning: DNS cache poisoning is a type of cyber attack that involves corrupting the data stored in the DNS cache of a
server, redirecting users to malicious websites.
85. UDP (User Datagram Protocol): UDP is a transport layer protocol that provides a connectionless and lightweight method of
communication between devices, suitable for real-time applications.
86. TCP (Transmission Control Protocol): TCP is a reliable, connection-oriented protocol in the transport layer of the Internet Protocol
Suite, ensuring error-free and ordered data delivery.
87. Router Advertisement (RA): Router Advertisement is a message sent by routers to announce their presence and provide network
configuration parameters to hosts in IPv6 networks.
88. MAC Layer: The MAC layer, or Media Access Control layer, is responsible for controlling access to the physical network medium and
handling frame addressing.
89. Multicast: Multicast is a communication method where data is sent from one sender to multiple receivers, allowing efficient content
distribution to a group of interested devices.
90. Port Security: Port security is a feature implemented on network switches to control which devices are allowed to connect to the
network through specific switch ports.
91. IGMP (Internet Group Management Protocol): IGMP is a communication protocol used by hosts and adjacent routers to establish
multicast group memberships.
92. DNSSEC (Domain Name System Security Extensions): DNSSEC is a suite of extensions to DNS that adds an additional layer of
security by validating DNS responses and ensuring data integrity.
93. Wavelength Division Multiplexing (WDM): Wavelength Division Multiplexing is a technology that combines multiple optical signals
on a single optical fiber by using different wavelengths of light.
94. FDDI (Fiber Distributed Data Interface): FDDI is a high-speed LAN technology that uses fiber optics to provide a reliable and fast
communication network.
95. ARP Poisoning: ARP poisoning is a cyber-attack where the attacker sends falsified Address Resolution Protocol (ARP) messages to link
an attacker's MAC address with the IP address of a legitimate device on the network.
96. Anycast: Anycast is a networking technique that routes data traffic to the nearest in a group of potential hosts with the same
destination IP address.
97. Cable Modem: A cable modem is a networking device that provides high-speed Internet access using the same coaxial cable that
delivers cable television.
98. TCP Three-Way Handshake: The TCP Three-Way Handshake is the process used to establish a connection between two devices,
ensuring that both are ready to send and receive data.
99. MIMO (Multiple Input, Multiple Output): MIMO is a technology that uses multiple antennas at both the transmitter and receiver to
improve communication performance and data throughput.
100. PKI (Public Key Infrastructure): PKI is a set of policies, procedures, and technologies used to secure communication and data by
managing encryption keys and digital certificates.

You might also like