1/31
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Local Area Network (LAN)
A network that connects devices over a small geographical area, such as a single building or office. Typically owned and managed by a single organization.
Wide Area Network (WAN)
A network that connects devices over a large geographical area, such as across cities or countries. The internet is the largest example of a WAN.
Wireless Local Area Network (WLAN)
A LAN that uses wireless technology (Wi-Fi) instead of cables to connect devices. Devices communicate via radio waves through a wireless access point.
Virtual Private Network (VPN)
A secure, encrypted connection over a public network (such as the internet) that allows users to access a private network remotely as if they were physically connected to it.
Personal Area Network (PAN)
A network used for communication between devices in close proximity to an individual, typically within a few meters. Common technologies include Bluetooth and infrared.
Virtual Local Area Network (VLAN)
A logical subdivision of a LAN that groups devices together regardless of their physical location, improving security and network management without requiring additional hardware.
Storage Area Network
A dedicated high-speed network that provides access to consolidated block-level data storage, typically used by organizations to connect servers to storage devices.
Client-Server
A network model where a central server provides resources or services, and clients request and receive those services from the server. The server is always on and waiting for requests. (Centralized)
Peer-to-Peer (P2P)
A network model where all devices (peers) act as both clients and servers simultaneously, sharing resources directly with each other without a central server.
(Decentralized)
Router
Directs traffic between networks. Forwards packets to their destination using IP addresses.
Switch
Connects devices within a single network. Smarter than a hub because it sends data only to the intended recipient using MAC addresses.
Hub
A basic device, broadcasts to all connected devices. Mostly obsolete, and replaced by Switches
Modem
A device that modulates and demodulates signals to allow digital data to be transmitted over analogue lines (e.g. telephone lines). Converts digital ↔ analogue.
Network Interface Card (NIC)
The hardware installed in a device that allows it to connect to a network. Each NIC has a unique MAC address.
Internet Protocol Address (IP Address)
A numerical label assigned to every device connected to a network using IP communication. It identifies the device's location on the network and enables data to be routed to the correct destination.
HyperText Transfer Protocol (HTTP)
The protocol used for transferring web pages over the internet between a web server and a browser.
HyperText Transfer Protocol Secure (HTTPS)
A secure version of HTTP that uses encryption to protect data in transit.
File Transfer Protocol
A protocol used to transfer files between a client and a server over a network.
Simple Mail Transfer Protocol (SMTP)
A protocol used for sending emails from a client to a mail server or between mail servers.
Post Office Protocol 3 (POP3)
A protocol used to retrieve emails from a server. Downloads emails to the local device and typically deletes them from the server.
Internet Message Access Protocol (IMAP)
A protocol used to retrieve emails from a server. Emails remain on the server and can be accessed from multiple devices.
Domain Name System (DNS)
A protocol/system that translates human-readable domain names (e.g. gooner67diddy.com) into IP addresses that computers can understand.
What is a pro of Wireless Networking?
Convenient, more mobility, cheaper.
What is a con of Wireless Networking
Slower, security risks, interference issues.
What is a pro of Ethernet?
Faster speed, reliable, secure.
What is a con of Ethernet?
Costly, limited mobility, easier to damage.
Encryption
Scrambling data so only the recipient can read it.
Authentication
The process of verifying the identity of a user or device before granting access.
Firewall
Filters network traffic to block unauthorized access.
Wi-Fi Protected Access (WPA)
Security protocols used to protect wireless networks through encryption and authentication.
Two-Factor Authentication (2FA)
An authentication method that requires two forms of verification.
Proxy Server
An intermediary server that filters requests between clients and the internet, providing anonymity and content filtering.