1/51
Vocabulary flashcards covering protocols, OSI layers, transport mechanisms, services, architectures, security tools, and topologies from the lecture notes.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Network Protocol
A set of rules that governs how data is exchanged securely and efficiently between devices.
OSI Model
A seven-layer conceptual framework that standardizes network communication functions.
Physical Layer (Layer 1)
Handles raw bit transmission over hardware such as cables and radios.
Data Link Layer (Layer 2)
Manages node-to-node connections and MAC addressing.
Network Layer (Layer 3)
Routes data packets between devices using logical addressing (e.g., IP).
Transport Layer (Layer 4)
Provides reliable or fast end-to-end data delivery with TCP, UDP, or SCTP.
Session Layer (Layer 5)
Establishes, maintains, and terminates communication sessions.
Presentation Layer (Layer 6)
Translates, encrypts, and compresses data for the application layer.
Application Layer (Layer 7)
Supplies user-facing network services such as web browsers or email clients.
HTTP
Protocol that transfers hypertext data on the World Wide Web.
HTTPS
Encrypted version of HTTP that secures web traffic with TLS/SSL.
FTP
Protocol used for transferring files between computers on a network.
TCP/IP
Foundational suite of protocols that powers the Internet.
SMTP
Protocol responsible for sending outbound email messages.
DNS
Service that translates human-readable domain names into IP addresses.
DHCP
Protocol that automatically assigns IP addresses to network devices.
UDP
Connectionless, fast transport protocol without delivery guarantees.
TCP
Connection-oriented transport protocol that ensures reliable, ordered delivery of data.
SCTP
Transport protocol combining TCP reliability with UDP-like message support.
Port
Logical endpoint number used to direct data to the correct application.
Network Service
Background process that supports essential connectivity or resource sharing.
DNS Service
Network service that maintains and resolves domain name records.
DHCP Service
Network service that leases IP configurations to clients automatically.
NTP
Protocol that synchronizes clocks of networked devices.
VPN
Encrypted tunnel providing secure remote access over public networks.
SSH
Secure protocol for remote command-line access and file transfer.
RDP
Microsoft protocol that enables graphical remote desktop connectivity.
POP3
Protocol for downloading email messages to a local client.
IMAP
Email protocol that keeps messages on the server for multi-device access.
Content Delivery Network (CDN)
Distributed servers that accelerate content delivery to end users.
Network as a Service (NaaS)
Cloud model that provides on-demand network functions and connectivity.
IP Addressing
Scheme that assigns logical numerical identifiers to network devices.
MAC Address
Unique hardware identifier assigned to a network interface card.
Packet Routing
Process of selecting paths for packets to travel across networks.
Client-Server Architecture
Model where centralized servers provide resources to client devices.
Peer-to-Peer Architecture
Network design where devices share resources directly without a central server.
PAN
Personal Area Network, typically using Bluetooth for close-range connectivity.
LAN
Local Area Network covering a home, office, or campus.
WLAN
Wireless Local Area Network that uses Wi-Fi for connectivity.
MAN
Metropolitan Area Network spanning a city or large campus.
WAN
Wide Area Network covering broad geographic areas, including the Internet.
Star Topology
Network layout with all devices connected to a central hub or switch.
Ring Topology
Network arrangement where each device connects to two others in a loop.
Mesh Topology
Design where every device interconnects with multiple others for redundancy.
Firewall
Security device that filters and blocks unauthorized network traffic.
IDS (Intrusion Detection System)
Monitors network traffic to detect malicious activity or policy violations.
IPS (Intrusion Prevention System)
Detects and actively blocks identified network threats.
CASB
Cloud Access Security Broker that enforces security policies on cloud usage.
ZTNA (Zero Trust Network Access)
Security approach that requires continuous verification before granting network access.
Secure Web Gateway
Proxy that filters malicious websites and enforces web usage policies.
Network Segmentation
Practice of dividing a network into smaller sections to limit attack spread.
Network Diagram
Visual representation of devices, connections, and topology for planning and troubleshooting.