A-Z Popular Blog Security Search »
Technology
 Advertisements
Related Guides
Information Technology

Related Topics
Integration

It Management

Systems Technology

Information Security

Technology Management

Networks

Technology Culture

Artificial Intelligence

Low Technology

Computing

62 Examples of Networking Basics

 , updated on
Networking is the practice of linking computing resources to provide systems, services, applications, data processing, analysis and communication. The following are a few networking basics.

Internet

A global network of interconnected networks. The largest network on the planet with about 4 billion users.

Intranet

The internal web sites of an organization deployed to a private network.

Extranet

An internet website that is restricted to authorized users. For example, a site that is only for employees, partners or customers.

Private Network

A network that is secured such that outside devices can't connect.

GAN

A global area network, or GAN, is a network that connects multiple locations in different countries.

WAN

A wide area network, or WAN, is a network that connects multiple locations in different regions of a country.

MAN

A metropolitan area network, or MAN, is a network that connects multiple locations in a city.

CAN

A campus area network, or CAN, is a network that connects multiple locations in the same area such as a university or corporate campus.

LAN

A local area network, or LAN, is a network that connects multiple devices at the same location such as an office network.

Home Network

A local area network that is shared by members of a household.

Personal Area Network

A network that is established by an individual for their personal use. Typically connects electronics such as computers, mobile devices, televisions, printers, data storage and media devices.

Overlay Network

A network that is build on top of the internet using encryption and specialized networking protocols.

Darknet

Another term for overlay network.

Deep Web

A term for any web pages that are connected to the internet but that aren't indexed by search engines, typically because they require authorization to view.

VPN

A virtual private network, or VPN, is an overlay network that is used to extend a private network over the internet. For example, a VPN can allow an employee working at home to connect to an office LAN.

URL

A human readable address that is used to locate resources on the internet.

IP

A machine readable address that is used to locate resources on the internet.

IPv4

The original format of IP addresses that includes the strings 0.0.0.0 to 255.255.255.255. This is less than 4.3 billion addresses. As such, these are in short supply.

IPv6

A successor to IPv4 with a length of 128 bits. This allows for 340,282,366,920,938,463,463,374,607,431,768,211,456 addresses.

DNS

A global hierarchical decentralized service that is used to map URLs to IPs.

Host

A machine or device that is connected to a network.

Hostname

The part of a URL that maps to an IP such as www.google.com.

Domain Name

The part of a hostname that is owned by an individual or organization such as google.com.

Host File

A file on most operating systems that allows you to override the IP returned by DNS. This can be used to test a service from your local machine.

HTTP

Hypertext transfer protocol, or HTTP, is a data communication protocol for web content and services.

Web

The web, or world wide web, is a term for the documents published on the internet that are accessed with the HTTP protocol using URLs.

SMTP

Simple mail transfer protocol, or SMTP, is an internet protocol for email transmission.

TCP

Transmission control protocol, or TCP, is a foundational communication protocol that underlies many internet-based networking technologies.

SSL

Secure socket layer, or SSL, is a security protocol for cryptographic data communication.

TLS

Transport Layer Security, or TLS, is a security protocol for cryptographic data communication. Essentially the more modern version of SSL.

IPsec

A secure networking protocol for mutual authentication based on cryptographic keys.

Compression

The conversion of data to a smaller format.

Cryptography

Cryptography is the science of coding data to prevent unauthorized access.

Encryption

The process of encoding data using cryptography.

Cryptographic Key

Data that is used to lock or unlock encrypted data.

Public Key

A cryptographic key that is openly published. Used to encrypt data for an entity that holds the corresponding private key.

Private Key

A cryptographic key that is kept secret. In some cases, a private key has a corresponding public key that allows anyone to encrypt but only those who hold the private key to decrypt.

SSL Certificate

A means of publishing the information required for SSL and TSL. Includes a public key and information about the organization that owns the corresponding private key.

Certificate Authority

The services that are responsible for publishing SSL certificates. You need to trust these organizations as they are important to your security on the internet.

Server

A machine that provides content or services.

Client

A device that uses content or services. A device can be both a client and a server.

P2P

A decentralized model of networking whereby clients interact without a central server coordinating things.

Request/Response

A model of networking whereby clients make requests to servers that respond.

Push

A model of networking whereby servers initiate exchanges with a client.

Synchronous

A mode of communication where a client makes a request and waits for a reply on the established connection.

Asynchronous

A mode of communication where a client makes a request but doesn't wait for the reply on the established connection. This is done for efficiency so that the client can work on other things while waiting for the reply.

Web Browser

A client for accessing a broad array of open technologies.

Mobile App

A client that is specifically constructed for a particular application to run on a particular mobile device.

Cloud Computing

Cloud computing is a class of technologies for using many physical machines for a single operation, service, system or application.

CDN

A content delivery network, or CDN, is a service for delivering files such as video, images and static html from a location that is geographically close to each request.

Edge Computing

A class of technologies for performing computation at a location that is relatively close to each client. For example, a mobile app in Tokyo that connects to a server in Tokyo.

Latency

The time it takes a message to travel from origin to destination.

Bandwidth

The amount of data that can be transferred in a period of time by a connection, device or technology. A theoretical limit of the technology set up.

Throughput

The actual amount of data successfully transmitted in a period of time.

Internet Backbone

A high capacity data route that connects large networks of the internet.

Router

A device that directs traffic on a network by forwarding data to a specified address.

Switch

A device that connects devices to a network by forwarding data to a specified address.

Hub

A device that connects devices to a network by forwarding data to every device connected to it. This allows all devices connected to the hub to see all data. Generally speaking, this isn't as efficient or secure as a switch.

Ethernet

A family of standards for wired networking.

Wifi

A family of standards for wireless networking.

Firewall

A network security device that monitors and controls network traffic based on a set of rules.

Intrusion Detection System

A security device that monitors a network or host for malicious activity or policy violations.
Overview: Networking
Type
Definition
The practice of linking computing resources to provide systems, services, applications, data processing, analysis and communication.
Related Concepts

Networking

This is the complete list of articles we have written about networking.
Architecture
Campus Network
CDN
Client-Server
Endpoints
Extranet
Internet Backbone
Internet Of Things
Intranet
Last Mile
Microtrenching
Network Security
Peer-to-peer
Personal Branding
Pervasive Networks
Point Of Presence
Private Network
Proxy Server
Public Network
Reverse Proxy
Space Network
Tarpit
Telecom
More ...
If you enjoyed this page, please consider bookmarking Simplicable.
 

Local Loopback

An overview of local loopback networking.

Internet

The internet explained.

Url

An overview of URLs.

Firmware

The definition of firmware with a few examples.

Proxy vs Reverse Proxy

The difference between proxies and reverse proxies with examples.

Network Throughput

A complete overview of network throughput.

Localhost

A complete overview of localhost with an example.

Networking

A list of networking techniques and concepts.

Near Real-Time

A definition of near real-time with examples.

Pervasive Networks

A definition of pervasive networks with examples.

Networks

A definition of network with examples.

Wide Area Network

A definition of wide area network with examples.

Personal Area Network

A definition of personal area network with examples.

Extranet

A definition of extranet with several examples.
The most popular articles on Simplicable in the past day.

New Articles

Recent posts or updates on Simplicable.
Site Map