| 
													
												     
												        Active FTP: A Client connects from a random unprivileged port to the FTP server port 21, using Active FTP......
												      
								    
	                                             | 
	
		| 
													
												     
												        Maximum Transmission Unit is the size of a layer of communication protocols of the largest protocol data unit which it can pass onwards........
												      
								    
	                                             | 
	
		| 
													
												     
												        Ethernet is a LAN architecture, which was developed by Xerox Corporation in cooperation with DEC and Intel.......
												      
								    
	                                             | 
	
		| 
													
												     
												        Ethernet Access Scheme is called Carrier Sense Multiple Access with Collision Detect (CSMA/CD).......
												      
								    
	                                             | 
	
		| 
													
												     
												        Token ring is a LAN technology that resides at the Data Link Layer of the OSI model. Special three-byte frame is used to travels around the ring.......
												      
								    
	                                             | 
	
		| 
													
												     
												        Network segment is a portion in a computer network where communication among every device is done using the same physical layer........
												      
								    
	                                             | 
	
		| 
													
												     
												        Hub: Hub is a device in a network, Data packet from one port is sent to all other ports in a network........
												      
								    
	                                             | 
	
		| 
													
												     
												        A packet is like a device or in some cases, a software. A router determines the next network point to which the data packet should be sent towards its destination........
												      
								    
	                                             | 
	
		| 
													
												     
												        A set of data rates are advertised by any gateway server. Some streams can be blocked by a gateway server from reaching the SP, in case the SP is opted for this service.......
												      
								    
	                                             | 
	
		| 
													
												     
												        A Media Access Control address is a unique identifier that is assigned to the network adapters or NICs by the manufacturers.......
												      
								    
	                                             | 
	
		| 
													
												     
												        Spanning Trees are a standard technique implemented in LAN connections. On a mesh topology, a set of spanning tree algorithms were developed for prevention of redundant transmission of data along intermediate hops between a source and a destination host.......
												      
								    
	                                             | 
	
		| 
													
												     
												        Ethernet technology: - Delivers high bandwidth to high-speed server connections. - Familiar technology and relatively inexpensive........
												      
								    
	                                             | 
	
		| 
													
												     
												        A Virtual Private Network is a private data network which is used for public telecommunication infrastructure.......
												      
								    
	                                             | 
	
		| 
													
												     
												        Private IP Address: An IP address is private if the number is within a specific range which is reserved for private uses by Internet Standards group......
												      
								    
	                                             | 
	
		| 
													
												     
												        MAC Address: A MAC address is a digital name of interface. Each and every network interface has a unique MAC address with unique ones.......
												      
								    
	                                             | 
	
		| 
													
												     
												        Address Resolution Protocol is used for networks that support hardware broadcast. An ARP will not work on x.25 network.......
												      
								    
	                                             | 
	
		| 
													
												     
												        Reverse Address Resolution Protocol (RARP) is a link layer networking protocol that is used by a host computer system which obtain its IP address......
												      
								    
	                                             | 
	
		| 
													
												     
												        TTL is a value in data packet of Internet Protocol. It communicates to the network router whether or not the packet should be in the network for too long or discarded.......
												      
								    
	                                             | 
	
		| 
													
												     
												        Internet Control Message Protocol is one of the important protocols in the Internet Protocol suite. It is mainly used in operating system of networked computers.......
												      
								    
	                                             | 
	
		| 
													
												     
												        Addressing: For the purpose of delivering datagram packets, IP needs to know about the address of the destination. By including the host addressing, this task is carried out by IP.....
												      
								    
	                                             | 
	
		| 
													
												     
												        IP addresses are organized into classes. For convenience of humans, IP addresses  are expressed in the decimal format.......
												      
								    
	                                             | 
	
		| 
													
												     
												        Unicast: A term used in communication to describe a piece of information to send from one point to another........
												      
								    
	                                             | 
	
		| 
													
												     
												        A network mask is used for determination of what subnet an IP address belongs to. An IP address has network address and the host address.....
												      
								    
	                                             | 
	
		| 
													
												     
												        A subnet describes a set of networked computers which have common IP address routing prefix.........
												      
								    
	                                             | 
	
		| 
													
												     
												        User datagram protocol allows computer applications to send messages as datagram packets from source to destination on an Internet Protocol........
												      
								    
	                                             | 
	
		| 
													
												     
												        TCP Windowing is a concept that is used for avoiding congestion in the network traffic......
												      
								    
	                                             | 
	
		| 
													
												     
												        A hierarchical naming system for computer systems, services or for that matter any resource participating in the internet.......
												      
								    
	                                             | 
	
		| 
													
												     
												        Data Encoding: A technique that requires the polar change in the line level after each bit. To gain the control circuitry that ensures consistent level discrimination.......
												      
								    
	                                             | 
	
		| 
													
												     
												        Packet Switching: A method of transmitting data group with the concern of content, type or structure into suitably-sized blocks.......
												      
								    
	                                             | 
	
		| 
													
												     
												        POP3 is a protocol that is used for downloading email from an ISP to the recipient mail program.......
												      
								    
	                                             | 
	
		| 
													
												     
												        IP address is a logical address of a computer system, where as MAC address is the physical address of a computer system that is usually persisted in network card........
												      
								    
	                                             | 
	
		| 
													
												     
												        A hardware loopback pug is a simple device for redirecting the outgoing transmissions from a system directly back into it........
												      
								    
	                                             | 
	
		| 
													
												     
												        Pulse Code Modulation: A digital representation of an analog signal. Signal sampling is done with the magnitude of the signal regularly at uniform intervals.......
												      
								    
	                                             | 
	
		| 
													
												     
												        Subnet mask is utilized for isolating the network id and host ids. This is to reduce the broadcast domain or to reduce heavy network traffic.......
												      
								    
	                                             | 
	
		| 
													
												     
												        A twisted pair is a cable in which the cables are twisted at regular distances. Twisted pairs are used for transferring signals with high frequency........
												      
								    
	                                             | 
	
		| 
													
												     
												        Kerberos is an authentication protocol in a compute network that makes the nodes communicates over a non-secure network for providing their identification to one another in most secure manner......
												      
								    
	                                             | 
	
		| 
													
												     
												        ISDN uses circuit switching where as ATM uses packet switching communication.......
												      
								    
	                                             |