DGS 3.4- Network & The Internet

1

Network

A series of interconnected nodes (connection points) that are able to transmit, receive and exchange data

2

Personal area network (PAN)

The smallest type of network, consisting of the connected devices that are in close proximity to an individual

3

Local area network (LAN)

A group of computers or devices that are connected on a single site

4

Metropolitan area network (MAN)

A network that covers a larger geographical area, such as city

5

Wide area network (WAN)

A national or international network; example is internet

6

Wireless networks

Use of wireless technologies to connect the different nodes to form a network (eg : uses radio signals)

7

Cloud network

Incorporation of network capabilities either public or private cloud platform

8

Client-server networks

A type of network where data is stored centrally on a server and access is given to each device (client) connected to the network.

9

Peer-to-peer network

A decentralized network in which each computer is equally responsible for storing and sharing data

10

Network interface card

Device responsible for converting data into a digital signal and communicating this data to a network

11

MAC address

A unique identifier assigned to every piece of hardware

12

Router

A networking technology that transfers data from one network to another by the most efficient route available

13

Modem

A device that converts digital data into analogue data so that it can be transmitted over a telephone line

14

Wireless access point (WAP)

A device that creates a wireless local area network to improve coverage throughout a building.

15

Hub

A networking device that broadcasts data to all devices on the network.

16

Switch

A networking device that forwards data packets more efficiently than a hub.

17

Interoperability

Allows different digital technologies or systems to connect and exchange data with one another without restrictions.

18

Network protocol

A set of agreed rules that state how to format, send and receive data

19

Transmission control protocol/ internet protocol (TCP/IP)

Protocol that defines where data is to be sent to and from (IP), and how the data is to be broken down into packets before sending (TCP)

20

IP (internet protocol) address

A logical numeric address that is assigned to every node on a network

21

Domain name server (DNS)

A server that translates domain names into IP addresses

22

Bandwidth

The maximum rate of data transfer at any one time, measured in hertz (Hz)

23

Speed

The length of time it takes for data to be transferred, measured in megabits per second (Mbps).

24

Data compression

Process that reduces the size of a file by reencoding it to use fewer bits of storage than the original file.

25

Net neutrality

all data requests on the internet should be treated equally by the internet service providers (ISPs) ~ internet should be free equally

26

Multi-factor authentication

The use of multiple methods of authentication to verify a user’s identity

27

Firewall

Hardware or software designed to block unauthorized access to a network by inspecting incoming and outgoing network traffic

28

Proxy server

Computer system that acts as an intermediary between the client on the network and the internet; providing an additional layer of security

29

Mobile service provider (MSP)

A company that offers cellular connection to mobile phone subscribers

30

VoIP (voice over internet protocol)

Allows users to make voice calls using a broadband Internet connection instead of an analogue phone line.

31

Internet service provider (ISP)

A company that provides internet access and other related services to its customers

32

Internet

The global collection of networks and networking technologies that link billions of users worldwide.

33

World Wide Web (WWW):

The websites and web services that are hosted on web servers and identified by their URL (uniform resource locator).

34

Internet of things (IoT)

Internet-connected devices that collect and share data

35

Spamming

Sending unsolicited emails, mainly for the purpose of advertising

36

Hacking

Unauthorized access to a computer or network

37

Social engineering

In internet security, this means to manipulate a user into sharing confidential or personal information with a fraudster - impersonate

38

Phishing

A type of social engineering that involves sending fraudulent emails designed to trick users into revealing sensitive information

39

Virus

A type of malicious software comprised of small pieces of code, often attached to legitimate programs or emails

40

Ransomware

Malware that infects a computer and effectively locks the user out of their own device and demands a payment to unlock it.

41

Distributed denial of service (DDOS) attacks

Overwhelming a site or service so that it is not available to its intended users. (attack to one’s server until its shut down)

42

Anonymity

The use of digital technology to conceal a person’s true identity

43

Internet trolls

People who leave intentionally provocative or offensive messages online in order to get attention, cause trouble or upset someone.

44

Identity theft

When someone steals your personal information with the intention of committing fraud. They may use your information to apply for a credit card or gain access to medical services.

robot