6

Glossary of 100 Networking Terms You Must Know

 1 year ago
source link: https://www.makeuseof.com/networking-terms-glossary/
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.

Glossary of 100 Networking Terms You Must Know

Published 21 hours ago

Whether you're new to computer networks or just need a refresher, this glossary of networking terms is bound to prove a useful resource.

Network Servers on an Enclosure

To stay ahead of the curve in the world of networking, you need to keep abreast of the latest terminology. With the ever-changing technology landscape, new words and phrases are added to the lexicon all the time.

That's why we've put together this glossary to help you better understand the basics of computer networks. It's a perfect resource to refer to, whether you're new to the field or just need a refresher.

You'll find definitions for common terms and more specific jargon that you're likely to encounter as you delve deeper into the world of networking. From AES to WPA, this glossary will become your trusty go-to guide.

FREE DOWNLOAD: This cheat sheet is available as a downloadable PDF from our distribution partner, TradePub. You will have to complete a short form to access it for the first time only. Download the Glossary of Networking Terms Cheat Sheet.

The Definition of 100 Networking Terms

Term Definition
3G Third generation of mobile telecommunications technology, typically offering higher data rates than earlier generations.
4G Fourth generation of mobile telecommunications technology, typically offering even higher data rates than 3G.
5G Fifth generation of mobile telecommunications technology, offering faster speeds and higher bandwidth than 4G.
Access Control List (ACL) A set of rules that controls traffic in and out of a network or individual device.
Address Unique identifier for a specific computer or device on a network.
Address Resolution Protocol (ARP) Protocol for mapping an Internet Protocol address (IP address) to a physical machine address that is recognized in the local network.
Administrator User with full control over a network or individual computer.
Address Resolution Protocol (ARP) Protocol used to map an IP address to a physical address, such as a MAC address.
Advanced Encryption Standard (AES) Symmetric key algorithm used to encrypt and decrypt data.
Amazon Web Services (AWS) Comprehensive, evolving cloud computing platform provided by Amazon.
Apache Popular open-source web server.
Application Programming Interface (API) Specific method prescribed by a computer software program for requesting services from another software program.
Asynchronous Transfer Mode (ATM) Cell-based switching technique for voice, video, and computer data.
Auto Scaling Cloud computing feature that provides the ability to scale an application up or down automatically according to conditions set by the user.
Bandwidth Amount of data that can be transferred over a given period of time.
Bit Smallest unit of data in a computer.
Bridge Device that connects two or more networks together.
Broadcast Message sent to all devices on a network.
Client Device or software application that requests services from a server.
Cloud Network of remote servers hosted on the internet and used to store, manage, and process data.
Cloud Computing Ability to access applications and data over the internet.
Cluster Group of computers that work together to provide high availability.
Code Set of instructions that a computer can understand.
Collision Condition that occurs when two devices on a network attempt to transmit at the same time.
Compiler Program that converts code into a form that a computer can execute.
Crossover Cable Type of Ethernet cable used to connect two devices of the same type, such as two computers.
Data Center Facility used to house networking equipment and other computer systems.
Data Encryption Standard (DES) Standard for encrypting data that was developed by the U.S. National Institute of Standards and Technology (NIST).
Data Link Layer Second layer of the OSI model, which is responsible for error-free transfer of data frames from one node to another.
Data Mining Process of extracting patterns from large data sets.
Database Collection of data that can be accessed by computers.
Database Server Server that stores and manages data in a database.
Dedicated Line Physical connection between two devices that is not shared with any other devices.
Denial of Service (DoS) Attack that prevents legitimate users from accessing a network or individual device.
Developer Programmer who writes code to create software applications.
Dial-up Type of internet connection that uses a telephone line.
Domain Name System (DNS) System that converts human-readable domain names into numerical IP addresses.
Dynamic Host Configuration Protocol (DHCP) Protocol for automatically assigning IP addresses to devices on a network.
Encryption Process of converting data into a form that cannot be read by unauthorized individuals.
Ethernet Popular type of physical network that uses twisted pair or fiber optic cables to connect devices.
Extranet Private network that uses the public internet to securely connect two or more locations.
File Transfer Protocol (FTP) Protocol used to transfer files from one computer to another over a network.
Firewall Device or software application that filters traffic between two networks or between a device and a network.
Firmware Software that is stored in a computer's read-only memory (ROM).
Gateway Device that connects two networks with different protocols or two devices with different interfaces.
Gigabit Ethernet Ethernet standard with a data transfer rate of one gigabit per second.
Hub Device that connects multiple network devices together.
Hypertext Transfer Protocol (HTTP) Protocol used to transfer web pages and other files on the World Wide Web.
Hypertext Transfer Protocol Secure (HTTPS) Secure version of HTTP that is used to transfer sensitive data, such as credit card numbers.
IGMP (Internet Group Management Protocol) Protocol used to manage multicast group membership.
Infrastructure as a Service (IaaS) Form of cloud computing that delivers computer infrastructure on an as-a-service basis.
Intrusion Detection System (IDS) System that monitors network traffic for signs of malicious activity.
Input Data or instructions that are entered into a computer.
JavaScript Programming language that is used to create interactive web pages.
Jitter Variation in delay between data packets sent across a network.
LAN (Local Area Network) Network that is confined to a relatively small area.
Leased Line Point-to-point link between two devices in which each device has a dedicated connection to the other.
Internet Protocol version 4 (IPv4) Previous version of the Internet Protocol (IP), which is being replaced by IPv6.
Internet Protocol version 6 (IPv6) Latest version of the Internet Protocol (IP), which is the protocol used to route data on the internet.
Internet Service Provider (ISP) Company that provides access to the internet.
IP Address Unique identifier for a device on a network.
Malware Short for "malicious software," it is any software designed to harm a computer or its user.
Modem Device that converts digital signals to analog signals and vice versa.
Multicast Message sent to a group of devices on a network.
NAT (Network Address Translation) Technique used to allow devices on a private network to communicate with devices on a public network.
Netmask Value used to specify which portion of an IP address represents the network and which portion represents the host.
Network Group of two or more devices that are connected.
Network Interface Card (NIC) Device that connects a computer to a network.
Network as a Service (NaaS) Form of cloud computing that delivers network infrastructure as a service.
Open system interconnection model (OSI model) Framework for understanding how data is transmitted between two nodes on a network.
Packet Unit of data that is sent over a network.
Peer-to-Peer Architecture Network architecture in which each computer or process on the network can act as both a client and a server.
Platform as a Service (PaaS) Form of cloud computing that delivers a computing platform and/or solution stack as a service.
Protocol Set of rules that govern communication between devices on a network.
Router Device that forwards packets between networks or between devices on the same network.
Secure Sockets Layer (SSL) Protocol for securing data transfer over the internet.
Server Device or software application that provides services to other devices or software applications.
Service Pack Collection of updates and fixes for a software program.
Simple Mail Transfer Protocol (SMTP) Protocol used to send email.
Software as a Service (SaaS) Form of cloud computing that delivers software as a service.
Spyware Type of malware that gathers information about a user without their knowledge.
Structured Query Language (SQL) Standard language for accessing and manipulating databases.
Subnet Portion of a network that is isolated from the rest of the network.
Switch Device that connects multiple devices together on a network and forwards packets between them.
Transmission Control Protocol (TCP) Protocol used to transfer data over a network.
Trojan Horse Type of malware that masquerades as legitimate software in order to trick users into installing it.
Unicast Message sent to a single destination on a network.
User Datagram Protocol (UDP) Protocol used to transfer data over a network.
Virtual Private Network (VPN) Technique used to create a secure connection between two or more devices over a public network.
Virtual Machine (VM) Software program that emulates the hardware of a computer.
Voice over IP (VoIP) Technique used to transmit voice traffic over a data network.
Wide Area Network (WAN) Network that covers a large geographical area.
Wireless Access Point (WAP) Device that connects wireless devices to a wired network.
Wired Equivalent Privacy (WEP) Security protocol for wireless networks.
Wi-Fi Protected Access (WPA) Security protocol for wireless networks. It's an improvement over WEP and is required for networks that use 802.11n.
Worm Type of malware that replicates itself and spreads to other computers on a network.
Zero Configuration Networking Set of technologies that automatically configures IP addresses and other network settings without user intervention.
Zombie Computer that has been infected with a virus and can be controlled by a remote attacker.
Zone Logical grouping of network resources. Zones can be used to segment a network for security or performance reasons.
Zone Transfer Process of copying DNS zone information from one DNS server to another.

Become a Computer Network Pro In No Time

With so many confusing terms, it's not surprising that people often feel discouraged when they first start learning about networking. However, don't let the challenge of remembering these definitions overwhelm you. The more you use and see them, the easier they'll become. Soon you'll be able to throw around networking terms like a pro!


About Joyk


Aggregate valuable and interesting links.
Joyk means Joy of geeK