Bit - Most essential representation of data (zero or one) at Layer 1 of the Open Systems Interconnection (OSI) model.
Internet Protocol (IPv4) - Is the dominant protocol that operates at the Open Systems Interconnection (OSI) Network Layer 3. IP is responsible for addressing packets so that they can be transmitted from the source to the destination hosts.
User Datagram Protocol (UDP) - The User Datagram Protocol provides connectionless data transfer without error detection and correction.
Bridges - Layer 2 devices that filter traffic between segments based on Media Access Control (MAC) addresses.
Switches - Operate at Layer 2. A switch establishes a collision domain per port.
Segment - Data representation at Layer 4 of the Open Systems Interconnection (OSI) model.
Virtual Local Area Networks (VLANs) - Allow network administrators to use switches to create software-based LAN segments that can be defined based on factors other than physical location.
Fibre Channel over Ethernet (FCoE) - A lightweight encapsulation protocol and lacks the reliable data transport of the TCP layer.
Voice over Internet Protocol (VoIP) - A technology that allows you to make voice calls using a broadband Internet connection instead of a regular (or analog) phone line.
Open Shortest Path First (OSPF) - An interior gateway routing protocol developed for IP networks based on the shortest path first or link-state algorithm.
Code-division multiple access (CDMA) - Every call's data is encoded with a unique key, then the calls are all transmitted at once.
Multiprotocol Label Switching (MPLS) - Is a wide area networking protocol that operates at both Layer 2 and 3 and does label switching.
Well-Known Ports - Ports 0-1023 ports are related to the common protocols that are utilized in the underlying management of Transport Control Protocol/Internet Protocol (TCP/IP) system, Domain Name Service (DNS), Simple Mail Transfer Protocol (SMTP), etc.
Registered Ports – Ports 1024 - 49151. These ports typically accompany non-system applications associated with vendors and developers.
Dynamic or Private Ports – Ports 49152 - 65535. Whenever a service is requested that is associated with Well- Known or Registered Ports those services will respond with a dynamic port.
Frame – Data represented at Layer 2 of the Open Systems Interconnection (OSI) model.
Packet - Representation of data at Layer 3 of the Open Systems Interconnection (OSI) model.
Segment - Data representation at Layer 4 of the Open Systems Interconnection (OSI) model.
Address Resolution Protocol (ARP) - used at the Media Access Control (MAC) Layer to provide for direct communication between two devices within the same LAN segment.
Port Address Translation (PAT) - An extension to NAT to translate all addresses to one routable IP address and translate the source port number in the packet to a unique value.
Virtual Local Area Networks (VLANs) - Allow network administrators to use switches to create software-based LAN segments that can be defined based on factors other than physical location.
Global System for Mobiles (GSM) - Each call is transformed into digital data that is given a channel and a time slot.
WiMAX (Broadband Wireless Access IEEE 802.16) - One well-known example of wireless broadband is WiMAX. WiMAX can potentially deliver data rates of more than 30 megabits per second.
Wi-Fi (Wireless LAN IEEE 802.11x) – Primarily associated with computer networking, Wi-Fi uses the IEEE 802.11x specification to create a wireless local-area network either public or private.
Bluetooth (Wireless Personal Area Network IEEE 802.15) - Bluetooth wireless technology is an open standard for short-range radio frequency communication used primarily to establish wireless personal area networks (WPANs), and it has been integrated into many types of business and consumer devices.
Point-to-Point Protocol (PPP) - Provides a standard method for transporting multiprotocol datagrams over point-to-point links.
Internet Group Management Protocol (IGMP) - Used to manage multicasting groups that are a set of hosts anywhere on a network that are listening for a transmission.
Internet Control Message Protocol (ICMP) - Provides a means to send error messages and a way to probe the network to determine network availability.
Multiprotocol Label Switching (MPLS) - Is a wide area networking protocol that operates at both Layer 2 and 3 and does label switching.
Content Distribution Network (CDN) - Is a large distributed system of servers deployed in multiple data centers across the internet.
Firewalls - Devices that enforce administrative security policies by filtering incoming traffic based on a set of rules.
Concentrators - Multiplex connected devices into one signal to be transmitted on a network
Smurf - ICMP Echo Request sent to the network broadcast address of a spoofed victim causing all nodes to respond to the victim with an Echo Reply.
Teardrop Attack - Exploits the reassembly of fragmented IP packets in the fragment offset field that indicates the starting position, or offset, of the data contained in a fragmented packet relative to the data of the original unfragmented packet.
Ping Scanning - Network mapping technique to detect if host replies to a ping, then the attacker knows that a host exists at that address.
Ping of Death – Exceeds maximum packet size and causes receiving system to fail.
Software-Defined Wide Area Network (SD-WAN) - Is an extension of the SDN practices to connect to entities spread across the internet to support WAN architecture especially related to cloud migration.
Network Function Virtualization (NFV) - The objective of NFV is to decouple functions such as firewall management, intrusion detection, network address translation, or name service resolution away from specific hardware implementation into software solutions.
Voice over Internet Protocol (VoIP) - A technology that allows you to make voice calls using a broadband Internet connection instead of a regular (or analog) phone line.
Session Initiation Protocol (SIP) – Is designed to manage multimedia connections.
Whitelisting - blacklisting - A whitelist is a list of email addresses and/or internet addresses that someone knows as “good” senders. A blacklist is a corresponding list of known “bad” senders.
Software-defined networks (SDNs) – Separates network systems into three components: raw data, how the data is sent, and what purpose the data serves. This involves a focus on data, control, and application (management) functions or “planes”.