With the ever-changing technology landscape, new words and phrases are added to the lexicon all the time.

That’s why we’ve put together this glossary to help you better understand the basics of computer networks.

From AES to WPA, this glossary will become your trusty go-to guide.

server units stacked together

FREE DOWNLOAD:This cheat sheet is available as a downloadable PDF from our distribution partner, TradePub.

You will have to complete a short form to access it for the first time only.

Download theGlossary of Networking Terms Cheat Sheet.

4G

Fourth generation of mobile telecommunications technology, typically offering even higher data rates than 3G.

5G

Fifth generation of mobile telecommunications technology, offering faster speeds and higher bandwidth than 4G.

Address

Unique identifier for a specific computer or gear on a connection.

Administrator

User with full control over a data pipe or individual computer.

Protocol used to map an IP address to a physical address, such as a MAC address.

Advanced Encryption Standard (AES)

Symmetric key algorithm used to encrypt and decrypt data.

Amazon Web Services (AWS)

Comprehensive, evolving cloud computing platform provided by Amazon.

Apache

Popular open-source web server.

Asynchronous Transfer Mode (ATM)

Cell-based switching technique for voice, video, and computer data.

Bandwidth

Amount of data that can be transferred over a given period of time.

Bit

Smallest unit of data in a computer.

Bridge

gear that connects two or more networks together.

Broadcast

Message sent to all devices on a online grid.

Client

rig or software system that requests services from a server.

Cloud Computing

Ability to access applications and data over the internet.

Cluster

Group of computers that work together to provide high availability.

Code

Set of instructions that a computer can understand.

Collision

Condition that takes place if two devices on a internet attempt to transmit at the same time.

Compiler

Program that converts code into a form that a computer can execute.

Data Center

Facility used to house networking equipment and other computer systems.

Data Mining

Process of extracting patterns from large data sets.

Database

Collection of data that can be accessed by computers.

Database Server

Server that stores and manages data in a database.

Dedicated Line

Physical connection between two devices that is not shared with any other devices.

Denial of Service (DoS)

Attack that prevents legitimate users from accessing a web connection or individual machine.

Developer

Programmer who writes code to create software applications.

Dial-up

jot down of internet connection that uses a telephone line.

Domain Name System (DNS)

System that converts human-readable domain names into numerical IP addresses.

Dynamic Host Configuration Protocol (DHCP)

Protocol for automatically assigning IP addresses to devices on a data pipe.

Encryption

Process of converting data into a form that cannot be read by unauthorized individuals.

Ethernet

Popular pop in of physical web link that uses twisted pair or fiber optic cables to connect devices.

Extranet

Private web link that uses the public internet to securely connect two or more locations.

File Transfer Protocol (FTP)

Protocol used to transfer files from one computer to another over a connection.

Firewall

equipment or software utility that filters traffic between two networks or between a equipment and a web connection.

Firmware

Software that is stored in a computer’s read-only memory (ROM).

Gateway

unit that connects two networks with different protocols or two devices with different interfaces.

Gigabit Ethernet

Ethernet standard with a data transfer rate of one gigabit per second.

Hub

unit that connects multiple web connection devices together.

IGMP (Internet Group Management Protocol)

Protocol used to manage multicast group membership.

Infrastructure as a Service (IaaS)

Form of cloud computing that delivers computer infrastructure on an as-a-service basis.

Intrusion Detection System (IDS)

System that monitors online grid traffic for signs of malicious activity.

Input

Data or instructions that are entered into a computer.

JavaScript

Programming language that is used to create interactive web pages.

Jitter

Variation in delay between data packets sent across a connection.

LAN (Local Area data pipe)

data pipe that is confined to a relatively small area.

Leased Line

Point-to-point link between two devices in which each machine has a dedicated connection to the other.

Internet Service Provider (ISP)

Company that provides access to the internet.

IP Address

Unique identifier for a machine on a data pipe.

Modem

gear that converts digital signals to analog signals and vice versa.

Multicast

Message sent to a group of devices on a online grid.

online grid

Group of two or more devices that are connected.

online grid Interface Card (NIC)

unit that connects a computer to a online grid.

connection as a Service (NaaS)

Form of cloud computing that delivers connection infrastructure as a service.

Packet

Unit of data that is sent over a connection.

Protocol

Set of rules that govern communication between devices on a data pipe.

Router

machine that forwards packets between networks or between devices on the same online grid.

Secure Sockets Layer (SSL)

Protocol for securing data transfer over the internet.

Server

gear or software software that provides services to other devices or software applications.

Service Pack

Collection of updates and fixes for a software program.

Simple Mail Transfer Protocol (SMTP)

Protocol used to send email.

Software as a Service (SaaS)

Form of cloud computing that delivers software as a service.

Spyware

key in of malware that gathers information about a user without their knowledge.

Structured Query Language (SQL)

Standard language for accessing and manipulating databases.

Subnet

Portion of a online grid that is isolated from the rest of the online grid.

Switch

gear that connects multiple devices together on a data pipe and forwards packets between them.

Transmission Control Protocol (TCP)

Protocol used to transfer data over a web link.

Trojan Horse

bang out of malware that masquerades as legitimate software so you can trick users into installing it.

Unicast

Message sent to a single destination on a web link.

Virtual Machine (VM)

Software program that emulates the hardware of a computer.

Voice over IP (VoIP)

Technique used to transmit voice traffic over a data internet.

Wide Area connection (WAN)

connection that covers a large geographical area.

Wireless Access Point (WAP)

gear that connects wireless devices to a wired online grid.

Wired Equivalent Privacy (WEP)

Security protocol for wireless networks.

Wi-Fi Protected Access (WPA)

Security protocol for wireless networks.

It’s an improvement over WEP and is required for networks that use 802.11n.

Worm

bang out of malware that replicates itself and spreads to other computers on a web connection.

Zero Configuration Networking

Set of technologies that automatically configures IP addresses and other online grid options without user intervention.

Zombie

Computer that has been infected with a virus and can be controlled by a remote attacker.

Zone

Logical grouping of online grid resources.

Zones can be used to segment a data pipe for security or performance reasons.

Zone Transfer

Process of copying DNS zone information from one DNS server to another.

However, don’t let the challenge of remembering these definitions overwhelm you.

The more you use and see them, the easier they’ll become.

Soon you’ll be able to throw around networking terms like a pro!