You are on page 1of 2

1.

The IPv4 address is a 32-bit number that uniquely identifies a network interface on a


machine.
2. IPv6 address is 128 bits long and is arranged in eight groups,
3. In the OSI reference model, the communications between a computing system are split
into seven different abstraction layers: Physical, Data Link, Network, Transport,
Session, Presentation, and Application.
4.Network Security is designed to protect your network and its data from multiple layers
of breaches and intrusions with hardware and software solutions.

4. A router is a networking device that forwards data packets between computer networks
5. A subnetwork or subnet is a logical subdivision of an IP network.
6. A broadcast domain is a logical division of a computer network, in which all
nodes can reach each other by broadcast at the data link layer. 

 Routing Information Protocol (RIP)
 Interior Gateway Protocol (IGRP)
 Open Shortest Path First (OSPF)
 Exterior Gateway Protocol (EGP)
 Enhanced Interior Gateway Routing Protocol (EIGRP)
 Border Gateway Protocol (BGP)
 Intermediate System-to-Intermediate System (IS-IS)
7. Dynamic Host Configuration Protocol



8. A routing protocol specifies how routers communicate with each other to distribute
information that enables them to select routes between any two nodes on a computer
network. 
9.  symmetric encryption uses one key for both encryption
and decryption, and the asymmetric encryption uses public
key for encryption and a private key for decryption.
10.  Forwarding is the process of a networking component accepting a packet and
transmitting it to its destination
11. For example, a router receives packets from hosts on one attached network and
forwards them to hosts on another attached network or to another router for
further forwarding.
12. IP' stands for 'Internet Protocol'. There are two versions of IP that currently
coexist in the global Internet: IP version 4 (IPv4) and IP version 6
(IPv6). IP addresses are made up of binary values and drive the routing of all
data over the Internet. IPv4 addresses are 32 bits long, and IPv6 addresses 128
bits long.
13. In networking, a protocol is a standardized set of rules for formatting and
processing data. Protocols enable computers to communicate with one another.
14. Encryption is the process of translating plain text data (plaintext) into something
that appears to be random and meaningless (ciphertext). Decryption is the
process of converting ciphertext back to plaintext. To encrypt more than a small
amount of data, symmetric encryption is used.

Encryption is the process of converting normal While decryption is the process of convert
message into meaningless message. meaningless message into its original form
15.  Hashes are the output of a hashing algorithm like MD5 (Message Digest 5) or
SHA (Secure Hash Algorithm). These algorithms essentially aim to produce a
unique, fixed-length string – the hash value, or “message digest” – for any given
piece of data or “message”.
16.
17. In telecommunications, a handshake is an automated process of negotiation
between two participants (example "Alice and Bob") through the exchange of
information that establishes the protocols of a communication link at the start of
the communication, before full communication begins.

You might also like