{# ================================================================ HEADER ================================================================ #}
{# ================================================================ MAIN CONTENT ================================================================ #}

Networking Glossary

Browse 101 networking terms organized by category — from IP addressing and DNS to security and VPN.

IP Addressing (15)

Anycast

A network addressing method where the same IP address is assigned to multiple servers in …

IP Addressing
Broadcast

A network communication method that sends data to all devices on a subnet simultaneously. The …

IP Addressing
CIDR

Classless Inter-Domain Routing. A method of allocating IP addresses using variable-length subnet masking (e.g., 10.0.0.0/8) …

IP Addressing
DHCP

Dynamic Host Configuration Protocol. A network protocol that automatically assigns IP addresses, subnet masks, gateways, …

IP Addressing
Dynamic IP

An IP address that is temporarily assigned to a device by a DHCP server and …

IP Addressing
IPv4

Internet Protocol version 4. The fourth revision of IP using 32-bit addresses (e.g., 192.168.1.1), providing …

IP Addressing
IPv6

Internet Protocol version 6. The successor to IPv4 using 128-bit addresses (e.g., 2001:0db8::1), providing a …

IP Addressing
Loopback Address

A reserved IP address (127.0.0.1 in IPv4, ::1 in IPv6) that routes traffic back to …

IP Addressing
Multicast

A network communication method that sends data from one source to a specific group of …

IP Addressing
NAT

Network Address Translation. A method of remapping private IP addresses to a single public IP …

IP Addressing
Private IP Address

An IP address from reserved ranges (10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16) used within local networks. Private addresses …

IP Addressing
Public IP Address

A globally unique IP address assigned by an ISP that is routable on the public …

IP Addressing
Static IP Address

A permanently assigned IP address that does not change over time. Commonly used for servers, …

IP Addressing
Subnet Mask

A 32-bit number (e.g., 255.255.255.0) that divides an IP address into network and host portions. …

IP Addressing
Unicast

A network communication method that sends data from one sender to one specific receiver. The …

IP Addressing

DNS (12)

Routing (10)

Security (15)

SSL/TLS Certificate

A digital document that binds a cryptographic key pair to an organization or domain, enabling …

Security
DDoS

Distributed Denial of Service. An attack that overwhelms a target server or network with massive …

Security
DNS Spoofing

An attack that corrupts DNS cache entries to redirect domain name lookups to a malicious …

Security
Encryption

The process of converting plaintext data into ciphertext using a cryptographic algorithm and key, making …

Security
Firewall

A network security device or software that monitors and filters incoming and outgoing traffic based …

Security
HTTPS

HTTP Secure. The encrypted version of HTTP that uses TLS to protect data in transit …

Security
Intrusion Detection System (IDS)

A security system that monitors network traffic or system activity for suspicious patterns and known …

Security
Man-in-the-Middle Attack

An attack where an adversary secretly intercepts and potentially alters communication between two parties who …

Security
Port Scanning

A technique used to discover which network ports on a host are open and listening …

Security
Proxy Server

An intermediary server that forwards requests between a client and destination server. Forward proxies anonymize …

Security
SOCKS Proxy

A general-purpose proxy protocol (SOCKS4/SOCKS5) that relays any TCP (and optionally UDP) traffic through a …

Security
SSL/TLS

Secure Sockets Layer / Transport Layer Security. Cryptographic protocols that provide encrypted, authenticated communication over …

Security
Tor

The Onion Router. An anonymity network that routes traffic through multiple encrypted relays (typically three) …

Security
VPN

Virtual Private Network. A technology that creates an encrypted tunnel between a device and a …

Security
Zero Trust

A security model based on the principle of "never trust, always verify." Every access request …

Security

VPN (8)

Protocols (12)

ARP

Address Resolution Protocol. A Layer 2 protocol that maps an IP address to a physical …

Protocols
FTP

File Transfer Protocol. A standard protocol for transferring files between a client and server over …

Protocols
HTTP

Hypertext Transfer Protocol. The application-layer protocol for transmitting web pages, APIs, and other resources. HTTP …

Protocols
ICMP

Internet Control Message Protocol. A network-layer protocol used for diagnostic and error-reporting purposes. Ping (echo …

Protocols
IMAP

Internet Message Access Protocol. An email retrieval protocol that synchronizes messages between a server and …

Protocols
NTP

Network Time Protocol. A protocol for synchronizing clocks across computer networks to within milliseconds of …

Protocols
POP3

Post Office Protocol version 3. An email retrieval protocol that downloads messages from a server …

Protocols
SMTP

Simple Mail Transfer Protocol. The standard protocol for sending email between servers and from clients …

Protocols
SNMP

Simple Network Management Protocol. A protocol for monitoring and managing network devices (routers, switches, servers) …

Protocols
SSH

Secure Shell. A cryptographic protocol for secure remote login, command execution, and file transfer over …

Protocols
TCP

Transmission Control Protocol. A reliable, connection-oriented transport protocol that guarantees ordered, error-checked delivery of data …

Protocols
UDP

User Datagram Protocol. A connectionless transport protocol that sends datagrams without establishing a connection or …

Protocols

Web (8)

Wireless (5)

Monitoring (5)

General (11)

{# ================================================================ FOOTER ================================================================ #} {# ================================================================ TOAST NOTIFICATIONS ================================================================ #}
{# ================================================================ SCRIPTS ================================================================ #}