Routing And Switching Study Cards

Enhance Your Learning with Routing and Switching Flash Cards for quick understanding



Routing

The process of selecting the best path for network traffic to reach its destination.

Switching

The process of forwarding network traffic between devices on a local area network (LAN).

Network Topology

The physical or logical layout of a network, including the arrangement of nodes and connections.

IP Address

A unique numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication.

Subnet Mask

A 32-bit number used to divide an IP address into network and host portions.

Default Gateway

The IP address of the router that connects a local network to other networks.

Routing Table

A data table stored in a router or networked computer that lists the routes to particular network destinations.

Static Routing

A routing method in which network administrators manually configure the routes in a routing table.

Dynamic Routing

A routing method in which routers exchange routing information with each other to automatically update their routing tables.

Interior Gateway Protocol (IGP)

A routing protocol used within an autonomous system to exchange routing information.

Exterior Gateway Protocol (EGP)

A routing protocol used to exchange routing information between different autonomous systems.

Open Shortest Path First (OSPF)

A link-state routing protocol used to find the best path for network traffic in IP networks.

Border Gateway Protocol (BGP)

A routing protocol used to exchange routing information between different autonomous systems on the Internet.

Ethernet

A widely used networking technology for local area networks (LANs) that defines wiring and signaling standards for the physical layer and data link layer of the OSI model.

Virtual LAN (VLAN)

A logical grouping of devices on a network, regardless of their physical location, that allows for easier network management and security.

Trunking

The process of carrying multiple VLANs over a single network link between switches.

Network Security

The practice of preventing unauthorized access, use, disclosure, disruption, modification, or destruction of information on a network.

Firewall

A network security device that monitors and filters incoming and outgoing network traffic based on predetermined security rules.

Intrusion Detection System (IDS)

A network security device that monitors network traffic for suspicious activity or policy violations and alerts network administrators.

Quality of Service (QoS)

A set of techniques used to manage network resources and prioritize certain types of network traffic to ensure reliable performance for critical applications.

Bandwidth

The maximum data transfer rate of a network or internet connection, typically measured in bits per second (bps).

Latency

The time delay between the sending and receiving of data packets over a network.

Packet Loss

The failure of one or more transmitted data packets to arrive at their destination.

Network Troubleshooting

The process of identifying, diagnosing, and resolving problems in a computer network.

Ping

A network utility used to test the reachability of a host on an Internet Protocol (IP) network and measure the round-trip time for packets sent from the source to the destination.

Traceroute

A network diagnostic tool used to track the path that packets take from a source to a destination over an IP network.

Network Management

The process of administering and controlling a computer network, including monitoring network performance, managing network devices, and troubleshooting network issues.

Simple Network Management Protocol (SNMP)

A protocol used to manage and monitor network devices, such as routers, switches, and servers, on an IP network.

Network Monitoring

The continuous monitoring of a computer network for performance, security, and availability issues.

Network Documentation

The process of creating and maintaining records of a computer network, including network diagrams, configurations, and inventory.

Network Backup

The process of creating copies of data or configurations on a network to protect against data loss or system failures.

Network Redundancy

The duplication of critical network components or paths to provide alternate routes in case of failure.

Network Virtualization

The creation of multiple virtual networks that share the same physical network infrastructure, allowing for better resource utilization and network isolation.

Software-Defined Networking (SDN)

A network architecture that separates the control plane from the data plane, allowing for centralized network management and programmability.

Network Address Translation (NAT)

A technique that allows multiple devices on a private network to share a single public IP address for internet connectivity.

IPv6

The most recent version of the Internet Protocol, designed to replace IPv4 and provide a larger address space and improved security and performance.

Internet of Things (IoT)

A network of physical devices, vehicles, appliances, and other objects embedded with sensors, software, and network connectivity to collect and exchange data.

Cloud Computing

The delivery of computing services, including servers, storage, databases, networking, software, and analytics, over the internet.

Virtual Private Network (VPN)

A secure network connection that allows users to access a private network over a public network, such as the internet.

Network Segmentation

The process of dividing a computer network into smaller subnetworks, known as segments, to improve performance, security, and manageability.

Network Load Balancing

The distribution of network traffic across multiple servers or network links to optimize resource utilization, maximize throughput, and minimize response time.

Network Protocol

A set of rules and conventions for communication between devices on a network, specifying how data is formatted, transmitted, and received.

Transmission Control Protocol (TCP)

A reliable, connection-oriented protocol used for transmitting data over IP networks.

User Datagram Protocol (UDP)

A connectionless, unreliable protocol used for transmitting data over IP networks, often used for real-time applications.

Internet Protocol Security (IPsec)

A suite of protocols used to secure IP communications by authenticating and encrypting data packets.

Secure Shell (SSH)

A cryptographic network protocol used for secure remote login, command execution, and file transfer between networked devices.

Domain Name System (DNS)

A hierarchical naming system that translates domain names, such as www.example.com, into IP addresses.

Dynamic Host Configuration Protocol (DHCP)

A network protocol used to automatically assign IP addresses and other network configuration parameters to devices on a network.

Network Time Protocol (NTP)

A protocol used to synchronize the clocks of devices on a computer network.

Simple Mail Transfer Protocol (SMTP)

A protocol used for sending email messages between servers over a network.

File Transfer Protocol (FTP)

A standard network protocol used for transferring files between a client and a server on a computer network.

Hypertext Transfer Protocol (HTTP)

A protocol used for transmitting hypertext documents, such as web pages, over the internet.

Secure Sockets Layer (SSL)

A cryptographic protocol used to secure communication over a computer network, commonly used for secure web browsing.

Virtual Private LAN Service (VPLS)

A network service that allows multiple sites to appear as if they are on the same LAN, even if they are located in different geographical locations.

Multiprotocol Label Switching (MPLS)

A routing technique that directs data packets along predefined paths, known as label-switched paths, to improve network performance and efficiency.

Virtual Local Area Network (VLAN)

A logical grouping of devices on a network, regardless of their physical location, that allows for easier network management and security.

Spanning Tree Protocol (STP)

A network protocol that prevents loops in Ethernet networks by dynamically disabling redundant paths.

Power over Ethernet (PoE)

A technology that allows network cables to carry electrical power to devices, such as IP phones, wireless access points, and security cameras.

Virtual Router Redundancy Protocol (VRRP)

A network protocol that provides automatic backup for routers, allowing for seamless failover in case of a router failure.

Network Attached Storage (NAS)

A file-level computer data storage server connected to a computer network, providing data access to multiple clients.

Storage Area Network (SAN)

A dedicated high-speed network that provides block-level access to data storage, allowing multiple servers to access shared storage devices.

Fiber Channel

A high-speed network technology commonly used for storage area networks (SANs) that allows for the transfer of large amounts of data over long distances.