Terms
Terms
Asynchronous Transfer Mode (ATM) Cell-based switching technique for voice, video, and computer data.
Bandwidth Amount of data that can be transferred over a given period of time.
Cloud Network of remote servers hosted on the internet and used to store, manage, and process data.
Cloud Computing Ability to access applications and data over the internet.
Collision Condition that occurs when two devices on a network attempt to transmit at the same time.
Data Center Facility used to house networking equipment and other computer systems.
Second layer of the OSI model, which is responsible for error-free transfer of data frames from one
Data Link Layer
node to another.
Dedicated Line Physical connection between two devices that is not shared with any other devices.
Denial of Service (DoS) Attack that prevents legitimate users from accessing a network or individual device.
Term Definition
Domain Name System (DNS) System that converts human-readable domain names into numerical IP addresses.
Encryption Process of converting data into a form that cannot be read by unauthorized individuals.
Ethernet Popular type of physical network that uses twisted pair or fiber optic cables to connect devices.
Extranet Private network that uses the public internet to securely connect two or more locations.
File Transfer Protocol (FTP) Protocol used to transfer files from one computer to another over a network.
Device or software application that filters traffic between two networks or between a device and a
Firewall
network.
Gateway Device that connects two networks with different protocols or two devices with different interfaces.
Gigabit Ethernet Ethernet standard with a data transfer rate of one gigabit per second.
Hypertext Transfer Protocol (HTTP) Protocol used to transfer web pages and other files on the World Wide Web.
LAN (Local Area Network) Network that is confined to a relatively small area.
Point-to-point link between two devices in which each device has a dedicated connection to the
Leased Line
other.
Internet Protocol version 4 (IPv4) Previous version of the Internet Protocol (IP), which is being replaced by IPv6.
Internet Protocol version 6 (IPv6) Latest version of the Internet Protocol (IP), which is the protocol used to route data on the internet.
Internet Service Provider (ISP) Company that provides access to the internet.
Malware Short for "malicious software," it is any software designed to harm a computer or its user.
Modem Device that converts digital signals to analog signals and vice versa.
Technique used to allow devices on a private network to communicate with devices on a public
NAT (Network Address Translation)
network.
Value used to specify which portion of an IP address represents the network and which portion
Netmask
represents the host.
Network as a Service (NaaS) Form of cloud computing that delivers network infrastructure as a service.
Network architecture in which each computer or process on the network can act as both a client and
Peer-to-Peer Architecture
a server.
Platform as a Service (PaaS) Form of cloud computing that delivers a computing platform and/or solution stack as a service.
Router Device that forwards packets between networks or between devices on the same network.
Secure Sockets Layer (SSL) Protocol for securing data transfer over the internet.
Server Device or software application that provides services to other devices or software applications.
Software as a Service (SaaS) Form of cloud computing that delivers software as a service.
Spyware Type of malware that gathers information about a user without their knowledge.
Structured Query Language (SQL) Standard language for accessing and manipulating databases.
Subnet Portion of a network that is isolated from the rest of the network.
Switch Device that connects multiple devices together on a network and forwards packets between them.
Transmission Control Protocol (TCP) Protocol used to transfer data over a network.
Trojan Horse Type of malware that masquerades as legitimate software in order to trick users into installing it.
User Datagram Protocol (UDP) Protocol used to transfer data over a network.
Virtual Private Network (VPN) Technique used to create a secure connection between two or more devices over a public network.
Virtual Machine (VM) Software program that emulates the hardware of a computer.
Voice over IP (VoIP) Technique used to transmit voice traffic over a data network.
Wide Area Network (WAN) Network that covers a large geographical area.
Wireless Access Point (WAP) Device that connects wireless devices to a wired network.