Computer Networks Glossary
Computer Networks Glossary
Welcome to the definitive glossary for Computer Networks. This is designed to act as your one-stop quick reference for essential networking concepts covered throughout the course. From basic OSI model layers to advanced SDN concepts, each definition bridges theoretical learning with practical, real-world examples.
Use this glossary to solidify your intuition, quickly refresh concepts before interviews, or bridge any knowledge gaps.
Note: This glossary provides core definitions to accelerate your learning. Refer to the specific modules for deep-dive explanations, interactive architecture maps, and hands-on examples.
C
CSMA/CD
Carrier Sense Multiple Access with Collision Detection. An algorithm used in half-duplex Ethernet networks to manage when devices can transmit data on a shared medium and how to recover if two devices transmit simultaneously causing a “collision”.
- Analogy: Polite conversation rules in a dark room. You listen if someone is speaking (Carrier Sense). If quiet, you talk. If you hear someone else start talking at the same time (Collision Detection), both stop, wait a random amount of time, and try again.
D
DHCP (Dynamic Host Configuration Protocol)
A network management protocol used to dynamically assign an IP address and other network configuration parameters (like subnet mask and default gateway) to each device on a network so they can communicate.
- Mechanism: DORA process (Discover, Offer, Request, Acknowledge).
DNS (Domain Name System)
The “phonebook” of the Internet. It translates human-readable domain names (like www.example.com) into machine-readable IP addresses (like 192.0.2.1).
- Analogy: Looking up a contact’s name in your phone to find their actual phone number.
H
HTTP/HTTPS (Hypertext Transfer Protocol / Secure)
The foundational protocol for transmitting hypermedia documents (like HTML) across the Web. HTTPS uses TLS to encrypt the data.
- Mechanism: A stateless, request-response protocol between a client (browser) and a server.
I
IP Address (Internet Protocol)
A logical, hierarchical address assigned to devices connected to an IP network.
- Usage: Used to route packets across different networks globally (like a postal address identifying city, street, and house). Includes IPv4 (32-bit, e.g.,
192.168.1.1) and IPv6 (128-bit).
M
MAC Address (Media Access Control)
A unique 48-bit hardware address permanently assigned to a network interface card (NIC) by the manufacturer.
- Usage: Used to deliver frames locally on a shared segment (like finding a specific desk in an office building). It is a “flat” address, unchangeable, and looks like
00:1A:2B:3C:4D:5E.
N
NAT (Network Address Translation)
A process used by a router to modify the source or destination IP addresses in packet headers. Typically used to map multiple private IP addresses (inside a local network) to a single public IP address before accessing the Internet.
- Why it matters: It delayed IPv4 exhaustion and adds a layer of security by hiding internal network structures.
O
OSI Model
The Open Systems Interconnection (OSI) model is a conceptual framework that standardizes the functions of a communication system into seven distinct layers.
- Analogy: Think of it like a mailing system—each department (layer) performs a specific task (packaging, addressing, routing) before passing it down or up the chain.
- Layers: Physical, Data Link, Network, Transport, Session, Presentation, Application.
R
Routing Protocols (BGP & OSPF)
- OSPF (Open Shortest Path First): An Interior Gateway Protocol (IGP) used to route traffic within a single autonomous system (like routing paths inside a university campus). Uses link-state algorithms to find the fastest path.
- BGP (Border Gateway Protocol): The Exterior Gateway Protocol (EGP) that powers the Internet. It routes traffic between different autonomous systems (like routing paths between different internet service providers).
S
SDN (Software-Defined Networking)
An architectural approach that decouples the network control plane (the “brains” deciding where traffic goes) from the data plane (the underlying hardware forwarding the traffic).
- Why it matters: Enables centralized, programmable management of the entire network structure via software APIs rather than configuring individual hardware switches manually.
Subnetting and CIDR
The practice of dividing a larger network into smaller logical networks (subnets). CIDR (Classless Inter-Domain Routing) uses a flexible slash notation (e.g., /24) to denote the subnet mask, rather than strict IP classes (A, B, C).
- Analogy: Taking a large piece of land and drawing fences to create separate, manageable plots, determining exactly how many houses can fit in each plot.
T
TCP (Transmission Control Protocol)
A connection-oriented transport protocol that provides reliable, ordered, and error-checked delivery of a stream of bytes between applications.
- Key Features: Three-way handshake (SYN, SYN-ACK, ACK), Flow Control (Sliding Window), and Congestion Control.
- Analogy: Sending a tracked package where the receiver must sign for every single item.
TCP/IP Model
A more practical, four-layer networking model upon which the actual Internet operates. It closely mirrors real-world protocol implementations.
- Layers: Network Access (Link), Internet, Transport, Application.
TLS/SSL Handshake
The process that kicks off an HTTPS session. The client and server agree on cryptographic algorithms, authenticate the server (usually with a certificate), and securely exchange a symmetric session key before transmitting actual data.
U
UDP (User Datagram Protocol)
A connectionless, lightweight transport protocol that sends independent packets (datagrams) without guaranteeing delivery, ordering, or duplicate protection.
- Key Features: Fast, low overhead.
- Use cases: Real-time applications where speed is preferred over perfection (e.g., VoIP, online gaming, live video streaming).
V
VPN (Virtual Private Network)
Creates a secure, encrypted “tunnel” over a public network (like the Internet), allowing users to send and receive data as if their devices were directly connected to a private network.
Next Steps: With these core concepts mastered, you are now ready to tackle the architectural case studies. Head over to the specific modules to explore how these protocols operate in large-scale production environments.