Enhance Your Learning with Routing and Switching Flash Cards for quick understanding
The process of selecting the best path for network traffic to reach its destination.
The process of forwarding network traffic between devices on a local area network (LAN).
The physical or logical layout of a network, including the arrangement of nodes and connections.
A unique numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication.
A 32-bit number used to divide an IP address into network and host portions.
The IP address of the router that connects a local network to other networks.
A data table stored in a router or networked computer that lists the routes to particular network destinations.
A routing method in which network administrators manually configure the routes in a routing table.
A routing method in which routers exchange routing information with each other to automatically update their routing tables.
A routing protocol used within an autonomous system to exchange routing information.
A routing protocol used to exchange routing information between different autonomous systems.
A link-state routing protocol used to find the best path for network traffic in IP networks.
A routing protocol used to exchange routing information between different autonomous systems on the Internet.
A widely used networking technology for local area networks (LANs) that defines wiring and signaling standards for the physical layer and data link layer of the OSI model.
A logical grouping of devices on a network, regardless of their physical location, that allows for easier network management and security.
The process of carrying multiple VLANs over a single network link between switches.
The practice of preventing unauthorized access, use, disclosure, disruption, modification, or destruction of information on a network.
A network security device that monitors and filters incoming and outgoing network traffic based on predetermined security rules.
A network security device that monitors network traffic for suspicious activity or policy violations and alerts network administrators.
A set of techniques used to manage network resources and prioritize certain types of network traffic to ensure reliable performance for critical applications.
The maximum data transfer rate of a network or internet connection, typically measured in bits per second (bps).
The time delay between the sending and receiving of data packets over a network.
The failure of one or more transmitted data packets to arrive at their destination.
The process of identifying, diagnosing, and resolving problems in a computer network.
A network utility used to test the reachability of a host on an Internet Protocol (IP) network and measure the round-trip time for packets sent from the source to the destination.
A network diagnostic tool used to track the path that packets take from a source to a destination over an IP network.
The process of administering and controlling a computer network, including monitoring network performance, managing network devices, and troubleshooting network issues.
A protocol used to manage and monitor network devices, such as routers, switches, and servers, on an IP network.
The continuous monitoring of a computer network for performance, security, and availability issues.
The process of creating and maintaining records of a computer network, including network diagrams, configurations, and inventory.
The process of creating copies of data or configurations on a network to protect against data loss or system failures.
The duplication of critical network components or paths to provide alternate routes in case of failure.
The creation of multiple virtual networks that share the same physical network infrastructure, allowing for better resource utilization and network isolation.
A network architecture that separates the control plane from the data plane, allowing for centralized network management and programmability.
A technique that allows multiple devices on a private network to share a single public IP address for internet connectivity.
The most recent version of the Internet Protocol, designed to replace IPv4 and provide a larger address space and improved security and performance.
A network of physical devices, vehicles, appliances, and other objects embedded with sensors, software, and network connectivity to collect and exchange data.
The delivery of computing services, including servers, storage, databases, networking, software, and analytics, over the internet.
A secure network connection that allows users to access a private network over a public network, such as the internet.
The process of dividing a computer network into smaller subnetworks, known as segments, to improve performance, security, and manageability.
The distribution of network traffic across multiple servers or network links to optimize resource utilization, maximize throughput, and minimize response time.
A set of rules and conventions for communication between devices on a network, specifying how data is formatted, transmitted, and received.
A reliable, connection-oriented protocol used for transmitting data over IP networks.
A connectionless, unreliable protocol used for transmitting data over IP networks, often used for real-time applications.
A suite of protocols used to secure IP communications by authenticating and encrypting data packets.
A cryptographic network protocol used for secure remote login, command execution, and file transfer between networked devices.
A hierarchical naming system that translates domain names, such as www.example.com, into IP addresses.
A network protocol used to automatically assign IP addresses and other network configuration parameters to devices on a network.
A protocol used to synchronize the clocks of devices on a computer network.
A protocol used for sending email messages between servers over a network.
A standard network protocol used for transferring files between a client and a server on a computer network.
A protocol used for transmitting hypertext documents, such as web pages, over the internet.
A cryptographic protocol used to secure communication over a computer network, commonly used for secure web browsing.
A network service that allows multiple sites to appear as if they are on the same LAN, even if they are located in different geographical locations.
A routing technique that directs data packets along predefined paths, known as label-switched paths, to improve network performance and efficiency.
A logical grouping of devices on a network, regardless of their physical location, that allows for easier network management and security.
A network protocol that prevents loops in Ethernet networks by dynamically disabling redundant paths.
A technology that allows network cables to carry electrical power to devices, such as IP phones, wireless access points, and security cameras.
A network protocol that provides automatic backup for routers, allowing for seamless failover in case of a router failure.
A file-level computer data storage server connected to a computer network, providing data access to multiple clients.
A dedicated high-speed network that provides block-level access to data storage, allowing multiple servers to access shared storage devices.
A high-speed network technology commonly used for storage area networks (SANs) that allows for the transfer of large amounts of data over long distances.