Skip to content

Latest commit

 

History

History
302 lines (151 loc) · 25.3 KB

Network.md

File metadata and controls

302 lines (151 loc) · 25.3 KB

Network

  1. Network: A network is a collection of interconnected devices (such as computers, smartphones, or servers) that can communicate with each other, share resources, and exchange data.

  2. Internet: The global network of networks that allows billions of devices worldwide to connect and communicate with each other. It is based on the Internet Protocol (IP).

  3. LAN (Local Area Network): A network that covers a limited geographic area, such as a home, office, or campus, and connects devices within that area.

  4. WAN (Wide Area Network): A network that spans a larger geographic area, often connecting multiple LANs, and typically relies on public or private telecommunication links.

  5. Router: A network device that forwards data packets between different networks, such as between a home network and the internet.

  6. Switch: A network device that connects devices within the same network, forwarding data only to the device that needs it, making it more efficient than hubs.

  7. Firewall: A security device or software that monitors and filters incoming and outgoing network traffic to protect a network from unauthorized access and threats.

  8. IP Address (Internet Protocol Address): A numerical label assigned to each device on a network, used for identifying and locating them within the network.

  9. DNS (Domain Name System): A system that translates human-readable domain names (like www.example.com) into IP addresses that computers can understand.

  10. Protocol: A set of rules and conventions that govern how data is transmitted and received over a network, ensuring compatibility between different devices and systems.

  11. Ethernet: A widely used networking technology that defines how data is transmitted over twisted-pair cables and is commonly used for LAN connections.

  12. Packet: A small unit of data that is transmitted over a network. Data is divided into packets for efficient transmission and reassembly at the destination.

  13. Wi-Fi (Wireless Fidelity): A wireless networking technology that allows devices to connect to a network without physical cables, commonly used for home and public internet access.

  14. Bandwidth: The maximum data transfer rate of a network connection, often measured in megabits per second (Mbps) or gigabits per second (Gbps).

  15. Latency: The time delay between sending data from one point in a network to receiving it at another, often measured in milliseconds (ms).

  16. VPN (Virtual Private Network): A technology that creates a secure, encrypted connection over a public network, such as the internet, to protect data privacy and security.

  17. Router: A device that connects different networks and routes data between them, allowing devices on one network to communicate with devices on another.

  18. Modem (Modulator-Demodulator): A device that converts digital data from a computer into analog signals for transmission over telephone or cable lines, and vice versa.

  19. Topology: The physical or logical arrangement of devices and connections in a network, which can be star, bus, ring, or mesh, among others.

  20. Gateway: A device or software component that serves as an entry point into a network and often provides translation between different network protocols.

  21. Subnet: A subdivision of an IP network, created to improve network management and organization. Subnets are used to group devices with similar IP addresses.

  22. MAC Address (Media Access Control Address): A unique hardware address assigned to each network interface card (NIC) or network adapter, used for identifying devices at the data link layer.

  23. Gateway: A device or software component that serves as an entry and exit point for data traffic between different networks, often used to connect a LAN to the internet.

  24. Load Balancing: The practice of distributing network traffic or computing workloads across multiple servers or network paths to ensure optimal resource utilization and performance.

  25. Quality of Service (QoS): A set of techniques used to manage and prioritize network traffic to ensure that critical data, such as VoIP calls or video streaming, gets sufficient bandwidth and low latency.

  26. Firewall: A network security device or software that monitors and controls incoming and outgoing network traffic to protect against unauthorized access and cyber threats.

  27. Protocol Suite: A comprehensive collection of networking protocols that work together to enable communication between devices on a network. The TCP/IP protocol suite is a common example.

  28. DNS Server: A server that stores DNS records and responds to DNS queries, translating domain names into IP addresses and vice versa.

  29. Proxy Server: An intermediary server that acts as a gateway between a client device and the internet, often used for caching, filtering, or enhancing security.

  30. Port: A numerical identifier used to distinguish different services or processes running on the same device within a network. Ports are associated with specific protocols (e.g., port 80 for HTTP).

  31. Routing: The process of determining the most efficient path for data packets to travel from the source to the destination in a network.

  32. NAT (Network Address Translation): A technique that allows multiple devices on a private network to share a single public IP address, usually implemented by a router.

  33. DHCP (Dynamic Host Configuration Protocol): A network protocol that automatically assigns IP addresses and other network configuration settings to devices on a network.

  34. FTP (File Transfer Protocol): A standard network protocol used for transferring files between a client and a server on a network.

  35. HTTP (Hypertext Transfer Protocol): The protocol used for transmitting and receiving web pages and other resources on the World Wide Web.

  36. HTTPS (Hypertext Transfer Protocol Secure): A secure version of HTTP that encrypts data between the client and the server, commonly used for secure online transactions and web browsing.

  37. VoIP (Voice over Internet Protocol): Technology that allows voice communication and multimedia sessions over the internet or other IP-based networks.

  38. Packet Loss: The percentage of data packets that do not reach their destination due to network congestion, errors, or other issues.

  39. VLAN (Virtual Local Area Network): A logical network segment created within a physical network to isolate and group devices based on factors like department or function.

  40. ICMP (Internet Control Message Protocol): A network protocol used for error reporting and diagnostics, including the "ping" command for testing network connectivity.

  41. SNMP (Simple Network Management Protocol): A protocol used to manage and monitor network devices and their performance, often employed by network administrators.

  42. DDoS (Distributed Denial of Service): An attack in which multiple compromised computers are used to flood a target system or network with an overwhelming volume of traffic, causing a disruption of service.

  43. Latency: The time delay that occurs when data packets travel from a source to a destination on a network, often measured in milliseconds (ms).

  44. Throughput: The actual amount of data that can be transmitted over a network in a given time, taking into account factors like latency and network congestion.

  45. Ping: A network utility used to test the reachability of a host on an Internet Protocol (IP) network and measure the round-trip time for packets to travel to the host and back.

  46. MAC Filtering: A security feature that allows or denies network access based on the Media Access Control (MAC) address of a device.

  47. SSL/TLS (Secure Sockets Layer/Transport Layer Security): Protocols that provide secure, encrypted communication over a network, commonly used for securing web browsing and email.

  48. Port Forwarding: A network configuration technique that directs incoming network traffic to a specific device or service within a private network.

  49. Router Table: A data structure on a router that contains information about the network's topology, including routes to various destinations.

  50. Multiprotocol Label Switching (MPLS): A high-performance routing technique that directs data packets through a network based on labels, improving efficiency and reliability.

  51. Wireless Access Point (WAP): A hardware device that allows Wi-Fi-enabled devices to connect to a wired network, often used to extend network coverage.

  52. Man-in-the-Middle (MitM) Attack: A cyberattack where an attacker intercepts and possibly alters communication between two parties without their knowledge.

  53. Latency-sensitive Applications: Applications and services that are highly sensitive to network latency, such as online gaming and real-time video conferencing.

  54. Network Segmentation: The practice of dividing a network into smaller, isolated segments to enhance security and manage traffic more effectively.

  55. Network Attached Storage (NAS): A dedicated storage device or server connected to a network that provides file storage and sharing services to multiple users and devices.

  56. Packet Sniffer: A tool or software application used to capture and analyze data packets as they traverse a network, often used for network troubleshooting or security monitoring.

  57. SDN (Software-Defined Networking): A network architecture that uses software-based controllers to centrally manage and configure network devices, making networks more flexible and programmable.

  58. IoT (Internet of Things): A network of interconnected physical devices and objects (such as sensors and appliances) that can communicate and exchange data over the internet.

  59. VoLTE (Voice over LTE): A technology that allows voice calls to be transmitted over 4G LTE networks, providing improved voice quality and faster call setup.

  60. Proxy Server: An intermediary server that acts as a gateway between a client device and the internet, often used for caching, filtering, or enhancing security.

  61. SSL Certificate: A digital certificate that establishes the authenticity of a website and enables secure, encrypted communication between a web browser and a web server.

  62. Peer-to-Peer (P2P) Network: A decentralized network architecture where devices communicate directly with each other without the need for a central server, often used for file sharing.

  63. Bandwidth Throttling: The intentional slowing down of internet connection speeds by an internet service provider (ISP) or network administrator, typically to manage network traffic or enforce data caps.

  64. NAT (Network Address Translation): A technique that allows multiple devices on a private network to share a single public IP address, usually implemented by a router.

  65. SOHO (Small Office/Home Office) Network: A network designed for small businesses or home offices, typically involving a few computers, printers, and networking equipment.

  66. Traceroute: A network diagnostic tool that traces the route that data packets take from the source to the destination, showing the path and any delays along the way.

  67. Mesh Network: A decentralized network topology where each device can communicate with every other device, often used for reliable and self-healing wireless networks.

  68. VoIP Phone: A specialized phone that uses Voice over Internet Protocol (VoIP) technology to make voice calls over the internet instead of traditional telephone lines.

  69. Packet Filtering: The process of inspecting data packets as they pass through a network device, like a firewall, and allowing or blocking them based on defined criteria.

  70. Network Protocol Analyzer: A tool used for monitoring and analyzing network traffic, helping to diagnose network issues and detect security threats.

  71. IPv6 (Internet Protocol version 6): The latest version of the Internet Protocol, designed to replace IPv4 and accommodate the growing number of devices connected to the internet.

  72. BGP (Border Gateway Protocol): A routing protocol used to exchange routing information between autonomous systems on the internet, critical for global internet connectivity.

  73. Wireless Security Standards: Security protocols and standards for securing Wi-Fi networks, including WEP, WPA, and WPA2/WPA3.

  74. Zero Trust Network: A security model that assumes no trust within a network and requires authentication and authorization for every user and device attempting to connect.

  75. Multicast: A network communication method where data is sent from one sender to multiple recipients simultaneously, often used for streaming media and online conferencing.

  76. Port Security: A feature in network switches that restricts access to specific Ethernet ports based on the MAC addresses of connected devices.

  77. WEP (Wired Equivalent Privacy): An older and less secure wireless network security protocol that encrypts data transmitted over a Wi-Fi network.

  78. DNS Cache: A temporary storage of DNS records on a device or server to speed up the domain name resolution process.

  79. SSO (Single Sign-On): A system that allows users to access multiple applications or services with a single set of login credentials.

  80. SSH (Secure Shell): A network protocol for securely accessing and managing network devices and servers over an unsecured network.

  81. IPsec (Internet Protocol Security): A suite of protocols used to secure internet communication by encrypting and authenticating data packets.

  82. Bandwidth Monitoring: The process of measuring and analyzing the utilization of network bandwidth to identify performance bottlenecks and optimize network resources.

  83. DMZ (Demilitarized Zone): A network segment that is isolated from the internal network and exposed to the external network, often used to host public-facing services like web servers.

  84. Ping Flood: A type of DoS (Denial of Service) attack in which an attacker overwhelms a target with a flood of ICMP echo request (ping) packets.

  85. OSI Model (Open Systems Interconnection Model): A conceptual framework that standardizes the functions of a telecommunication or computing system into seven distinct layers, making it easier to understand and design networks.

  86. UPnP (Universal Plug and Play): A set of networking protocols that allow devices to discover each other and establish network services without manual configuration.

  87. Traceback: The process of identifying the source or origin of malicious network traffic, often used in cyberattack investigations.

  88. Proxy ARP (Address Resolution Protocol): A technique used in networking where one device answers ARP requests on behalf of another, often used in network address translation (NAT) scenarios.

  89. Zero-Day Vulnerability: A security vulnerability in software or hardware that is exploited by attackers before the vendor has had a chance to develop and distribute a patch or fix.

  90. Packet Forwarding: The process of passing data packets from one network device to another based on routing decisions, typically performed by routers and switches.

  91. AI in Networking: The application of artificial intelligence (AI) and machine learning (ML) techniques to network management and optimization.

  92. Content Delivery Network (CDN): A network of distributed servers that work together to deliver web content and media to users with high performance and availability.

  93. Firmware: Software that is embedded in a hardware device, often used to control the device's operation and behavior, including network equipment like routers and switches.

  94. Multi-factor Authentication (MFA): A security method that requires users to provide two or more forms of authentication before granting access to a system or network.

  95. MIMO (Multiple-Input, Multiple-Output): A technology used in wireless communication to improve data throughput by using multiple antennas for transmitting and receiving.

  96. Network Scanner: A tool or software used to discover and map devices and services on a network, often used for network inventory and security assessments.

  97. Latency Jitter: Variability in the delay experienced by data packets traveling through a network, which can impact the quality of real-time applications like voice and video calls.

  98. Network Simulation: The use of software to create a virtual representation of a network for testing and experimentation without affecting the physical network.

  99. Intrusion Detection System (IDS): A security system that monitors network traffic for suspicious activities or patterns and alerts administrators to potential security threats.

  100. Bandwidth Shaping: The practice of controlling the speed and flow of network traffic to prioritize certain types of data or ensure fair usage.

  101. Network Addressing: The process of assigning unique addresses to devices on a network, including IP addresses, MAC addresses, and port numbers.

  102. ICANN (Internet Corporation for Assigned Names and Numbers): A non-profit organization responsible for managing and coordinating the global domain name system (DNS) and IP address allocation.

  103. Intranet: A private network that uses internet technologies and protocols to securely share information within an organization.

  104. Extranet: A network that allows specific external users or organizations to access a part of an organization's intranet, often for collaborative purposes.

  105. Reverse Proxy: A server that acts as an intermediary between client devices and a web server, handling requests on behalf of the clients and enhancing security and performance.

  106. PaaS (Platform as a Service): A cloud computing service model that provides a platform and environment for developers to build, deploy, and manage applications without worrying about underlying infrastructure.

  107. IaaS (Infrastructure as a Service): A cloud computing service model that provides virtualized computing resources over the internet, including servers, storage, and networking.

  108. BYOD (Bring Your Own Device): A policy that allows employees to use their personal devices (such as smartphones and laptops) for work purposes on a company's network.

  109. Green Computing: A practice of designing, using, and disposing of computing and networking equipment in an environmentally friendly and energy-efficient way.

  110. Internet of Everything (IoE): An extension of the Internet of Things (IoT) that encompasses not only devices but also people, processes, and data, creating a highly interconnected digital environment.

  111. Network Discovery: The process of identifying and mapping devices, resources, and services on a network, often used for network management and troubleshooting.

  112. Port Mirroring: A network configuration where network traffic on one network port is duplicated and sent to another port for monitoring or analysis.

  113. Botnet: A network of compromised computers or devices controlled by a remote attacker, often used for malicious purposes such as launching DDoS attacks or spreading malware.

  114. Latency Optimization: Techniques and strategies aimed at reducing network latency to improve the responsiveness of applications and services.

  115. AI-Driven Network Operations: The use of artificial intelligence (AI) and machine learning (ML) algorithms to automate and optimize network management, monitoring, and troubleshooting.

  116. Packet Loss Rate: A metric that measures the percentage of data packets that fail to reach their destination due to network congestion, errors, or other issues.

  117. Zero-Day Attack: A cyberattack that exploits a vulnerability in software or hardware on the same day it becomes known, leaving no time for the vendor to release a fix or patch.

  118. VoIP Protocol: Protocols used for voice communication over IP networks, including SIP (Session Initiation Protocol) and RTP (Real-time Transport Protocol).

  119. MAC Spoofing: A technique used by attackers to impersonate a legitimate device by changing or "spoofing" its MAC address.

  120. Quality of Experience (QoE): A measure of the overall satisfaction and performance of users when using networked applications and services, taking into account factors like latency, jitter, and reliability.

  121. Latency-sensitive Applications: Applications that require low latency for optimal performance, such as online gaming, telemedicine, and financial trading platforms.

  122. Network Redundancy: The inclusion of backup components or paths in a network to ensure continued operation in the event of component failure or network disruption.

  123. BYOA (Bring Your Own Application): A trend where employees use their preferred software applications for work-related tasks, often leading to compatibility and security challenges for IT departments.

  124. Hybrid Cloud: A cloud computing environment that combines public and private cloud resources, allowing data and applications to move seamlessly between them.

  125. Edge Computing: A distributed computing paradigm where data processing and storage occur closer to the data source (the "edge") rather than in a centralized data center, reducing latency and improving responsiveness.

  126. Load Balancer: A device or software that evenly distributes network traffic among multiple servers or resources to optimize performance, reliability, and availability.

  127. Network Monitoring: The practice of continuously observing and analyzing network performance and activities to ensure optimal operation and identify issues.

  128. IoT Gateway: A device that acts as an intermediary between IoT devices and the cloud or other network infrastructure, facilitating data collection, processing, and communication.

  129. Botnet Detection: Techniques and tools used to identify and mitigate the presence of botnets on a network, often involving behavioral analysis and anomaly detection.

  130. Zero Trust Architecture (ZTA): A security model that assumes no trust, verifying the identity and security of every user and device trying to access resources within a network.

  131. Cloud-Native Networking: Networking solutions and practices that are specifically designed for cloud-based and containerized applications, providing flexibility and scalability.

  132. Software-Defined WAN (SD-WAN): A technology that uses software to manage and optimize the routing of data traffic across a wide area network, improving network performance and agility.

  133. IoT Security: Security measures and protocols designed to protect Internet of Things (IoT) devices and networks from cyber threats and vulnerabilities.

  134. Blockchain: A decentralized and secure digital ledger technology that can be used to record and verify transactions and data across multiple network nodes.

  135. Red Team vs. Blue Team: Red teaming involves simulating cyberattacks to test a network's vulnerabilities, while blue teaming focuses on defending against those attacks, often used in cybersecurity training and assessments.

  136. Zero-Trust Network Access (ZTNA): A security framework that limits access to network resources based on strict identity verification, even for users within the organization's perimeter.

  137. Network Automation: The use of scripts, software, or tools to automate network configuration, provisioning, and management tasks, reducing human errors and improving efficiency.

  138. Dark Web: A part of the internet that is intentionally hidden from search engines and requires special software, such as Tor, to access, often associated with illegal activities.

  139. Packet Analyzer: A tool or software used to capture, inspect, and analyze data packets as they travel across a network, helping with troubleshooting and network optimization.

  140. Edge Router: A router located at the edge of a network, often connecting an organization's internal network to external networks like the internet.

  141. Bottleneck: A point in a network where data traffic is restricted or slowed down, often causing performance issues.

  142. Smart Grid: An advanced electrical grid that uses digital technology, sensors, and communication networks to improve efficiency and reliability of electricity distribution.

  143. Network Segmentation: The practice of dividing a network into smaller, isolated segments for security and performance reasons.

  144. Network Convergence: The process of combining different types of network traffic, such as data, voice, and video, onto a single network infrastructure.

  145. Network Policy: A set of rules and guidelines that define how devices and users are allowed to access and use network resources.

  146. Security Information and Event Management (SIEM): A comprehensive approach to security management that combines the collection and analysis of security-related data and events.

  147. Social Engineering: A technique used by attackers to manipulate individuals into revealing confidential information or performing actions that compromise security.

  148. Zero-Day Patch: A security update or fix released by software or hardware vendors to address a zero-day vulnerability.

  149. WAN Optimization: Techniques and technologies used to maximize the efficiency of data transfer over wide area networks, often involving data compression and caching.

  150. Network Troubleshooting: The process of identifying and resolving issues or problems in a network to ensure its proper functioning.