Unit 5: Computer Networking Terms
Network Interface Card
A card that connects a computer to network wired or wireless.
Wireless Access Point (WAP)
A central communications device that allows computers and devices to transfer data wirelessly among themselves or to a wired network.
Modem
A combined device for modulation and demodulation, for example, between the digital data of a computer and the analog signal of a telephone line. Connects a computer device to the internet.
Internet Service Provider (ISP)
A company that connects computers to the internet for a fee. Abbreviated to ISP.
LAN(Local Area Network)
A computer network that connects nodes that are relatively close to each other, usually in the same building. Usually it is wired, but wireless is becoming more common.
WAN (Wide Area Network)
A computer network that covers a large geographic area, such a city, country, or the world, using a communication channel the combines.
Node
A computer or other electronic device connected to a network.
Server
A computer that provides client stations with access to files and shared resources to a computer network. Very good at storing a lot of data.
Switch
A device that uses its ports to connect nodes together. This device can detect all computers connected to the local area network and their MAC Addresses. Usually present in a star network.
Hub
A device that uses its ports to connect nodes. This device can detect computers connected to the local area network. Usually present in a star network.
Private Key Encryption
A form of encryption that uses a single, private key that is known by both the sender and receiver, or by the programs that the sender and receiver are using, to encrypt messages
Computer Network
A group of computers that are connected and communicate with one another
DSL (Digital Subscriber Line)
A method of connecting to the Internet via a phone line. This connection uses copper telephone lines but is able to relay data at much higher speeds than modems and does not interfere with telephone use.
Public Key Encryption
A method of paired key encryption in which the key used to encrypt data is made available to anybody and its corresponding decryption key is kept secret.
Metropolitan Area Network (MAN)
Network that spans a metropolitan area, usually a city and its major suburbs. Its geographic scope falls between a WAN and a LAN.
Packet
Part of a message that is transmitted over a network
Topology
Physical arrangement of devices in a network.
Encryption
Process of converting readable data into unreadable characters to prevent unauthorized access.
PAN (Personal Area Network )
Provides communication for devices owned by a single user that work over a short distance. Bluetooth devices connected to each other.
Ad Hoc Network
When two or more wireless clients communicate directly with each other, without the need for a wireless access point (WAP).
Coaxial Cable (Coax)
one central wire surrounded by insulation, a metallic shield, and a covering of insulation
256 Bit Encryption
Data/file encryption technique that uses a 256-bit key to encrypt and decrypt data or files.
Terminator
Device attached to the end-points of a bus network. Purpose absorb signals so that they do not reflect back down the line
Mesh Network
Devices are connected with many redundant interconnections between network nodes.
Router
Electronic device used to connect two or more nodes to each other and also connect one network to another network. They forward data packets between computer networks.
Asymmetric Encryption
used in public key encryption, it is scheme in which the key to encrypt data is different from the key to decrypt.
Protocols
Technical rules governing data communication. The agreed upon format transmitting data between two devices.
Infrastructure Network
This topology uses a combination of wired and wireless devices.
Ethernet
A system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems.
Caesar Cipher
A technique for encryption that shifts the alphabet by some number of characters.
Bluetooth Technology
A type of wireless technology that uses radio waves to transmit data over short distances (approximately 3-300 feet depending on power); often used to connect peripherals such as printers and keyboards to computers or headsets to cell phones.
MAC (Media Access Control) Address
A unique identifier similar to a serial number assigned to networking equipment at the time of manufacture.
Wireless Mesh Network (WMN)
A wireless network in which multiple access points work as peer devices on the same network, thereby providing more fault-tolerant network access to clients.
Symmetric Encryption
An encryption method whereby the same key is used to encode and to decode the message.
Campus Area Network (CAN)
An interconnection of networks located in nearby buildings (for example, buildings on a college campus).
Star Network
A network in which all network devices connect to one another through a single central device (hub or switch)
Wireless Network
A network that connects devices using radio signals. There is no physical wired connection between between sender and receiver.
Ring Network
A network topology where each node is daisy chained together where the end of the network comes back around to the first node, forming a complete circle
Bus Network
A network topology where each node is daisy-chained along the same backbone, similar to Christmas lights.
IP Address (Internet Protocol Address)
A number that uniquely identifies each computer or device connected to the Internet.
Firewall
A part of a computer system or network that is designed to block unauthorized access while permitting outward communication. A security feature that prevents the flow of information to and from unauthorized networks.
Virtual Private Network (VPN)
A private data network that creates secure connections, or "tunnels," over regular Internet lines.
Decryption
A process that reverses encryption, taking a secret message and reproducing the original plain text.
Protocol
A set of rules governing the exchange or transmission of data between devices.
Algorithm
A step-by-step procedure for solving a problem, especially by a computer.
Proxy Server (proxy)
Software server that handles all communications originating from or being sent to the Internet, acting as a spokesperson or bodyguard for an organization.