Here I’m compiling a list of important terms, acronyms, buzzwords, and jargon for quick referencing. Things should be alphabetized, but the list is quite long and still growing, so you’ll probably want to use your browser’s find/search function (ctrl + f) to quickly find the term you’re looking for.
Work In Progress
This page is very much still being worked on - I’m completely changing how I manage the glossary (it’s gotten a little out of hand) Apologies for broken links or missing definitions (to say nothing of missing terms!)
Index
A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
A
Access Control Entry
A single entry in an Access Control List (ACL). Essentially serves as a rule, or a filter, for how the interface will (or won’t) forward traffic.
ACEs are typically processed in the order they are added to the ACL, and when a given packet is matched by the an ACE it is either forwarded or dropped, per the ACE. Any subsequent ACEs are ignored/not processed.
Related
Link to original
Access Control List (ACL)
A list of Access Control Entries (ACEs) which serve as a set of rules for filtering/allowing traffic to be forwarded on a router’s interface. All interfaces can have up to two ACLs, one for Inbound traffic, and one for Outbound traffic.
Related
Link to original
Address Resolution Protocol (ARP)
A communication protocol used for discovering the MAC address of unknown devices. When a device needs to forward traffic to an IP for which it has no associated MAC address in its address table, it will broadcast an ARP Request message containing it’s IP and the IP of the device whose MAC it is trying to find. Only the correct recipient device will unicast an ARP Reply to the source device.
Related
Address Resolution Protocol (ARP),
Link to original
AdministrativeDistance
In the event that more than one Dynamic Routing protocol is being used in the same network, AD indicates which protocol is more ‘trustworthy’ (more likely to select a good route) so the router can determine which protocol’s metric should be used to select a route.
Link to original
Area (OSPF)
An area is a collection of routers and links that share an LSDB.
OSPF uses areas to divide a large network into more easily managed sizes, to help reduce the size of LSDBs and the number of LSAs being transmitted.
Link to original
Autonomous System (AS)
A single organization (i.e. a company)
Link to original
B
Backup Designated Router (BDR)
The backup to an OSPF network’s Designated Router (DR).
A router in an OSPF Broadcast-type network is elected Designated Router (DR) and another is elected Backup Designated Router (BDR). These two routers serve as the central points for exchanging OSPF routing information. All other OSPF-enabled routers will synchronize their LSDBs from the DR and BDR, and will only form full adjacencies with the DR and BDR.
The BDR will become the DR if the DR is disabled or otherwise becomes unreachable.
Link to original
Border Gateway Protocol (BGP)
The only EGP Dynamic Routing Protocol presently in use in modern networks.
Link to original
Botnet
A group of malware-infected computers that can be remotely directed to attack a single target, usually with a Denial-of-Service attack. This kind of DoS attack would be more accurately called a Distributed Denial of Service (DDoS) attack.
Related
Link to original
Bridge
Typically, this term refers to a network switch in modern parlance.
Technically, bridges are predecessors to modern switches; they are Layer 2 devices that forward traffic within a LAN. Actual bridges are very uncommon in modern networking, though they are still referenced in a lot of networking technology and documentation, thus they are commonly conflated with switches.
Link to original
Broadcast
Broadcast messages are delivered to all devices in a local network. Compare to Multicast and Unicast
Broadcast messages are sent to a networks Broadcast Address.
Link to original
Broadcast Address
The IP Address a network uses for forwarding Broadcast Messages. Typically, though not necessarily, it is the last usable host address of the network/subnetwork’s address space.
Link to original
Broadcast Domain
A network segment whose constituent nodes can all be reached with a broadcast message
Link to original
Broadcast Storm
When a group of switches loop broadcast messages to the point that the network suffers from congestion.
Link to original
C
Carrier Sense Multiple Access with Collision Detection (CSMA/CD)
A system for preventing collisions in network traffic when multiple devices are sending traffic in the same def_CollisionDomain.
Link to original
def_CIATriad
CIA Triad
A list of three basic principles that define the foundations of digital security:
- Confidentiality (only those with authorization should be able to access the system/network/data/etc.)
- Integrity (Data should not be tampered with. Stored data should be correct and authentic.)
- Availability (The systems/network/data/etc. should be functioning and accessible by authorized users.)
Related
Link to original
Collision Domain
A network segment where simultaneous data transmissions collide with one another, resulting in lost or improperly organized PDUs.
Link to original
Cyclic Redundancy Check (CRC)
An error-detecting code commonly used in computer networking. In particular, used by the Ethernet header FCS.
Link to original
D
Datagram
Link to original
Denial of Service (DoS) Attack
A network attack that targets a system’s availability, usually by sending massive numbers of messages to the network.
Related
Denial-of-Service (DoS), Security
Link to original
Designated Router (DR)
A router in an OSPF Broadcast-type network is elected Designated Router (DR) and another is elected Backup Designated Router (BDR). These two routers serve as the central points for exchanging OSPF routing information. All other OSPF-enabled routers will synchronize their LSDBs from the DR and BDR, and will only form full adjacencies with the DR and BDR.
The BDR will become the DR if the DR is disabled or otherwise becomes unreachable.
Link to original
DHCP Snooping
A security feature of switches that is used to filter DHCP messages received on ‘untrusted’ ports. Typically, uplink ports (those that lead towards the DHCP server) are configured as ‘trusted’, while downlink ports are left untrusted.
Filtering, in this case, does not necessarily mean discarding packets, but rather inspection of DHCP traffic. Through DHCP snooping, devices can mitigate DHCP starvation & DHCP poisoning attacks by preventing fraudulent DHCP messages from entering the network.
Related
Link to original
Digital Subscriber Line (DSL)
A consumer-level home Internet service technology that utilized PSTN phone lines for transmitting IP traffic.
While DSL has been relegated to legacy status in large swathes of the world, it is still used in some places. At the time of its conception it was very convenient as many homes already had phone lines installed, so no additional infrastructure was needed for a house to get internet access, aside from a modem.
Related
Link to original
Dijkstra’s Algorithm
An algorithm for finding the shortest path between to nodes in a weighted graph (a network).
Related
Link to original
Distributed Denial of Service (DDoS)
Where a DoS attack is performed with the use of a large group of attacking computers, usually a botnet.
Related
Distributed Denial of Service (DDoS), Security
Link to original
Domain Name System (DNS)
A system for resolving IP addresses from host names, usually URLs/Web Domain Names, by requesting them from DNS Servers. Plain-English (or whatever language) host names are easier to read, write, and remember than IPv4/v6 addresses, so it is useful to be able to enter a website name into a browser (for instance) and have the computer automatically determine the correct IP address to forward/receive traffic from.
Related
Link to original
Drop Eligible Indicator (DEI)
A field in the 802.1Q header. It is only a single bit long, and that bit signals if the packet may be dropped if the network is overly congested.
Link to original
Dynamic Routing
Any process by which routers dynamically (automatically) discover routes to network destinations, and advertise routes to connected addresses to neighbor routers.
There are a number of Dynamic Routing protocols including RIP, EIGRP, and OSPF.
Link to original
E
Equal Cost Multi-Path (ECMP)
In Dynamic Routing, when two or more routes to the same destination have an equal def_Metric cost, traffic will be load-balanced across them.
Link to original
Exterior Gateway Protocol (EGP)
A type of Dynamic Routing protocol which is used to share routes between different autonomous systems.
Link to original
Enhanced Interior Gateway Routing Protocol (EIGRP)
An advanced distance vector Dynamic Routing protocol. Originally Cisco proprietary, much of the protocol has been released for all manufacturers to use, though most vendors have not implemented it. Considered a more advanced routing protocol than RIP, another distance vector protocol.
EIGRP is the only IGP capable of unequal-cost load-balancing.
Link to original
EtherChannel
EtherChannel allows a switch to treat multiple physical interfaces as a single logical interface. This allows two switches to be connected together by multiple interfaces and use all of the bandwidth available to all connected interfaces while still being able to use STP to prevent Layer 2 loops/broadcast storms.
Link to original
Ethernet
A collection of computer networking technologies first standardized by the IEEE as IEEE 802.3.
Link to original
Extended Unique Identifier (EUI)
Typically called EUI-64 or modified EUI-64. EUI-64 is a method of converting a MAC address (48 bits) into a 64-bit interface identifier. This identifier can then be used as the host portion of a /64 IPv6 address.
Related
Link to original
F
Fiber Distributed Data Interfaces (FDDI)
A standard for fiber-optic based LANs. Later included specifications for copper cabling. Effectively made obsolete by FastEthernet.
While the standard fell out of fashion due to its comparatively lack-luster network speeds and high costs, it notably had very long transmission distances compared to copper UTP based networks. Cable runs could allegedly extend up to 200km, though it seems doubtful that most networks would ever come close to that.
Link to original
Filesystem
A filesystem (or file system) is a computer’s method of controlling how data is locally stored and retrieved. All computers have a filesystem, although the specific system each uses depends on the particular operating system.
Related
Link to original
File Transfer Protocol (FTP)
A standard protocol for sending files between devices over a network. First standardized in 1971, and has received several updates since.
In networking, FTP (along with the similar protocol TFTP) is commonly used for transmitting operating system updates to network devices.
Related
Link to original
First Hop Redundancy Protocol (FHRP)
A computer networking protocol which is designed to protect the default gateway used on a subnetwork by allowing two or more routers to provide backup for that address; in the event of failure of an active router, the backup router will take over the address, usually within a few seconds. Credit: Wikipedia
”First Hop” refers to the fact that the default gateway in any network is the first hop, i.e. the first router to whatever destination outside the network a given host is sending traffic to.
Related
First Hop Redundancy Protocols (FHRPs),
Link to original
Floating Static Route
A statically configured route whose Administrative Distance has been configured to be higher than those of dynamically learned routes to the same destination. These routes are inactive unless the route learned by the dynamic protocol is removed, due to hardware failure or any other reason.
Link to original
Frame
The Layer 2 PDU. It’s header contains source and destination MAC Addresses, among other data.
Link to original
Frame Check Sequence (FCS)
A 4-byte data field at the end of an Ethernet frame used for detecting errors in the frame using a cyclic redundancy check (CRC).
Link to original
G
Gateway Load Balancing Protocol (GLBP)
A Cisco-proprietary redundant router protocol that has basic load balancing functionality. While some other protocols can load balance across two or more VLANs, GLBP can load balance traffic from the same VLAN across up to four routers.
Related
Link to original
Gratuitous ARP
ARP replies sent without being requested (no ARP request message was received).
Related
Address Resolution Protocol (ARP), First Hop Redundancy Protocols (FHRPs)
Link to original
H
Host
An endpoint/edge node on a network. Typically either a PC or a server, but could be devices like printers, phones, etc.
Link to original
Host File
On most Operating Systems, this is a file that contains mappings of IP addresses to host names. These names are used to manually send/receive traffic to/from network nodes without the user needing to memorize and type out the destination’s IP address repeatedly. This is used as an alternative to, and along side with, DNS, not as a replacement for it.
See Verifying & Configuring IP Parameters On Clients for OS-specific info.
Related
Verifying & Configuring IP Parameters On Clients, DNS
Link to original
Host Route
An IP route to a specific host. I.e. has a /32 netmask.
Link to original
Hot Standby Router Protocol (HSRP)
A Cisco proprietary redundancy protocol for gateway routers.
Related
Link to original
Hub
A Layer 1 device that receives traffic on any interface and floods it out all other interfaces. Hubs are predecessors to modern switches, and do nothing to break up the def_CollisionDomain. Therefore, all devices connected to them must run in def_HalfDuplex mode using CD.
Link to original
I
The Institute of Electrical and Electronics Engineers (IEEE)
A standards organization, responsible for creating and maintaining many of the most common Computer Networking standards used today, including the Ethernet suite (802.3). See Industry Standards
Link to original
Interior Gateway Protocol (IGP)
A type of Dynamic Routing Protocol which shares routes within a single autonomous system.
See Types of Dynamic Routing Protocol
Link to original
Internet Protocol (IP)
The network layer communications protocol in the Internet Protocol Suite for relaying datagrams across network boundaries. Its routing function enables internetworking, and essentially established the Internet. Credit: Wikipedia
Related
Internet Protocol Suite (TCP_IP)
Link to original
Internet Protocol Suite (TCP/IP)
Commonly referred to as TCP/IP, this is the collection of protocols and general rules/framework for how the Internet, and communication across it, should work. The three foundational protocols are the Transmission Control Protocol (TCP), the User Datagram Protocol (UDP), and the Internet Protocol (IP).
The first versions of the modern IP Suite were developed by DARPA with funding from the US Department of Defense.
Related
Link to original
Intermediate System to Intermediate System (IS-IS)
A Link State based Interior Gateway Dynamic Routing protocol.
See Dynamic Routing
Link to original
Inter-Switch Link (ISL)
A Cisco-proprietary trunking protocol.
Link to original
L
Link Aggregation Control Protocol (LACP)
IEEE 802.3ad; An industry-standard EtherChannel protocol. Dynamically negotiates the creation & maintenance of an EtherChannel.
Related
EtherChannel, Industry Standards
Link to original
Local Area Network (LAN)
A LAN is a collection of devices connected together in one physical location.
A more precise techinical definition is A LAN is a group of connected devices that are all within the same Broadcast Domain.
Link to original
Link State
A type of Dynamic Routing protocol in which all connected routers develop identical ‘connectivity maps’ (i.e. network maps).
Link to original
Link State Advertisement (LSA)
A basic OSPF message. They are used to exchange routing information between routers in the same area.
Link to original
Link State Database (LSDB)
A kind of ‘connectivity map’ stored by an OSPF-activated router. Contains information on the available routes of the router’s OSPF neighbors in the form of LSAs.
Link to original
M
Malware
Sort for ‘malicious software’. Malware refers to a wide variety of harmful programs that can ‘infect’ a target computer.
Related
Link to original
Maximum Transmission Unit (MTU)
The size of the largest PDU that can be communicated in a single transaction.
In Ethernet the maximum frame size is 1518 bytes. 18 bytes are consumed by the header and FCS, leaving an MTU of 1500 bytes.
Link to original
Metric
In Dynamic Routing, a metric is the standard by which any particular protocol ranks the superiority of available routes to a network destination i.e. the ‘cost’ of using a given route where lower ‘costs’ are preferable.
Different protocols use different metrics, and thus are not meaningfully comparable. For comparisons between different routes from different protocols see def_AdministrativeDistance.
Link to original
Back to IndexModem (DSL)
(In DSL) A device that converts IP data into a format suitable for transmission over PSTN phone lines. These were necessary for DSL home Internet connections. Today modems, along with DSL itself, are not especially common due to more advanced technologies (cable and fiber internet) and the societal pivot away from landline to mobile phones.
(In Cable Internet) A device that translates IP traffic into a format suitable for transmission over CATV networks, similar to DSL modems.
Related
Link to original
N
Network Management Station (NMS)
AKA Network Management System In a SNMP network, the NMS is the device or devices that manage the other devices on a network; The SNMP ‘server.‘
Related
Simple Network Management Protocol (SNMP)
Link to original
Non-Preemptive
(Regarding a console command) does not interrupt the running process.
E.g. when configuring the OSPF priority of an interface to prioritize a particular router to be DR, the actual reselection of DR/BDR won’t take place until OSPF is reset, even if the interface’s priority is changed. This means the
Link to originalip ospf priority
command is non-preemptive.
O
Open Shortest Path First (OSPF)
A link state interior gateway dynamic routing protocol.
Determines routes using Dijkstra’s Algorithm with information from the LSDB, a kind of network connectivity map. Routers share information about their known connections with each other via LSAs.
Related
Link to original
Open Systems Interconnection Model (OSI Model)
A reference model, created by the International Organization for Standardization (ISO) that serves as an example for how computer networks should be structured. While it is not directly implemented in any major networks today, it is primarily useful as a reference for discussing the theory of Networking.
The OSI Model splits computer networking into seven layers:
- Physical
- Data Link
- Network
- Transport
- Session
- Presentation
- Application
Related
Link to original
P
Packet
The Layer 3 PDU. Typically refers to IP Packets in particular.
Link to original
Port Security
A security feature of Cisco switches. Port security allows you to permit or deny particular MAC addresses from sending traffic into an interface.
Related
Link to original
Protocol Data Unit (PDU)
A single unit of information used by a computer networking protocol.
Common examples are Segments (Layer 4), Packets (Layer 3), and Frames (Layer 2)
Link to original
R
Resolution (Address Resolution)
- The process of obtaining an internet address from a host name. See DNS
- (Address Resolution) Determining the link-layer address (e.g. MAC address) of a neighbor. See ARP, NDP
Related
Domain Name System (DNS), Address Resolution Protocol (ARP), Neighbor Discovery Protocol (NDP)
Link to original
Request For Comments (RFC)
A publication from various standards-setting organizations, most notably the Internet Engineering Task Force (IETF). An RFC is submitted by an individual or a group, usually in the form of a memorandum describing protocols, procedures, research, et cetera that are relevant to the Internet and its supporting systems. While not all RFCs are standards (particularly the purely informational ones), RFCs serve as the official documentation for Internet Standards.
Typically, these publications are informational in nature, though RFCs have been written purely for comedic value.
Link to original
S
Secure Shell (SSH)
SSH is a protocol for remotely accessing the CLI (the shell) of a remote device in the same LAN or over the Internet. SSH was created to be a more secure alternative to other protocols such as Telnet, and has largely become the de facto standard for remote shell access.
Related
Link to original
Segment
Link to original
- The Layer 4 PDU. Also called a Datagram.
- A portion of a network.
Shell
A shell is a computer program which exposes an operating system’s services to a user or to another program. Typically, OS shells use a CLI or GUI.
It is called ‘shell’ because it is the outermost layer around the operating system.
Related
Link to original
def_StatelessAddressAutoConfiguration
Stateless Address Auto-Configuration (SLAAC)
A protocol that allows network hosts to automatically learn the IPv6 prefix of the local link (i.e.
2001:db8: :/64
), and then automatically generate an IPv6 address. The address will be generated either using EUI-64 or pseudo-randomly, depending on the device & manufacturer.Related
Link to original
Static Routing
Manually configuring a network route on a router. As the route cannot change on its own it is ‘static’. This is as opposed to Dynamic Routing, where network routes are automatically created and updated by the routers of a network.
Related
Static Routing, Static Routing, Dynamic Routing
Link to original
Syslog
An industry standard message logging protocol. In networking, Syslog is used to log a wide assortment of ‘events’ on a device, such as interface status, changes in neighbor statuses in a dynamic routing protocol, system restarts, and many more. The information these logs store, including their timestamps, is often invaluable for troubleshooting network issues.
Syslog messages can be stored locally on a device, or sent to an external Syslog server.
Outside of networking, Syslog is also used for logging on host/client devices (Windows, MacOS, Linux, etc.) to track system changes, user activity, and other information.
Related
Link to original
T
TCP/IP
See IP);
Related
Link to original
Telnet
Short for Teletype Network, Telnet is a protocol developed in 1969, used for remotely accessing the CLI (the shell) of a remote system on the same LAN or over the Internet.
Telnet has been largely replaced by SSH due to its much improved security.
Related
Link to original
Transmission Control Protocol (TCP)
One of the main protocols of the Internet Protocol Suite. Compliments the Internet Protocol (IP) by providing reliable, ordered, and error-checked data streams between hosts.
Related
Link to original
Trivial File Transfer Protocol (TFTP)
A standard protocol for transferring files between network devices. TFTP is similar to its predecessor FTP, although is much simpler and works with less overhead, at the cost of offering fewer features and poorer security.
Related
Trivial File Transfer Protocol (TFTP)
Link to original
U
Unshielded Twisted Pair (UTP)
Broadly refers to cabling that uses pairs of copper conductors, twisted together to reduce electro-magnetic interference. Most commonly, this refers to typical RJ45-terminated network cabling, e.g. Cat-5, Cat-5e, Cat-6, etc.
Link to original
User Datagram Protocol (UDP)
One of the primary protocols that makes up the Internet Protocol Suite. UDP plays a similar role to TCP but lacks many of the latter’s features, such as sequencing and error correction. However, it is capable of more data throughput due to its lower operation overhead. It is commonly used for applications where transfer speeds are more important that accuracy or reliability, for example VoIP or live video broadcasting.
Related
Link to original
V
Variable Length Subnet Masking (VLSM)
A system in which network prefixes have variable length. Typically, classful netmask for an IPv4 address would have a /8, /16, or /24 bit long prefix, depending on the class. In VLSM, a network prefix may be an arbitrary number between 1 and 32, depending on the number of host addresses needed for the subnet.
VLSM, and CIDR (which is based on VLSM) were created to slow the exhaustion of IPv4 addresses by reducing the allocating larger subnets than needed.
Related
Link to original
Virtual Private Network (VPN)
A method for creating a secure connection between nodes across a WAN. VPNs use encryption to make the data they transmit unreadable to anyone but the source and destination hosts, making them useful as a way to securely transmit data over public networks, such as the Internet.
Related
Link to original
Virtual Router Redundancy Protocol (VRRP)
Provides automatic assignment of available IP routers to participating hosts.
Related
Link to original
W
Wide Area Network (WAN)
A network that extends over large geographic areas. WANs are used to connect geographically separate LANs.
Related
Link to original