Skip to content

VOCABULARY

This document provides a comprehensive glossary of networking terms, acronyms, and their full forms used throughout this guide.


  1. OSI Model Terms
  2. TCP/IP & Protocol Terms
  3. IP Addressing Terms
  4. Subnetting Terms
  5. DNS Terms
  6. DHCP Terms
  7. NAT & PAT Terms
  8. Routing Terms
  9. Firewall Terms
  10. VPN Terms
  11. Wireless Terms
  12. Load Balancing Terms
  13. VLAN Terms
  14. Cloud Networking Terms
  15. General Networking Terms

TermFull FormDescription
OSIOpen Systems InterconnectionReference model for network communication
OSI ModelOpen Systems Interconnection Model7-layer conceptual model for networking
PDUProtocol Data UnitData unit at each OSI layer
Application LayerLayer 7Top layer where user applications interact with network
Presentation LayerLayer 6Data translation and encryption
Session LayerLayer 5Session management between applications
Transport LayerLayer 4End-to-end communication, reliability
Network LayerLayer 3Routing and logical addressing
Data Link LayerLayer 2Physical addressing, MAC addresses
Physical LayerLayer 1Physical transmission of bits
L1Layer 1Physical layer (see Physical Layer)
L2Layer 2Data link layer (see Data Link Layer)
L3Layer 3Network layer (see Network Layer)
L4Layer 4Transport layer (see Transport Layer)
L5Layer 5Session layer (see Session Layer)
L6Layer 6Presentation layer (see Presentation Layer)
L7Layer 7Application layer (see Application Layer)

TermFull FormDescription
TCPTransmission Control ProtocolConnection-oriented, reliable transport protocol
UDPUser Datagram ProtocolConnectionless, unreliable transport protocol
IPInternet ProtocolNetwork layer addressing and routing protocol
HTTPHyperText Transfer ProtocolApplication protocol for web traffic
HTTPSHTTP SecureHTTP with TLS/SSL encryption
FTPFile Transfer ProtocolProtocol for file transfers
SSHSecure ShellSecure remote access protocol
SMTPSimple Mail Transfer ProtocolEmail sending protocol
POP3Post Office Protocol v3Email retrieval protocol
IMAPInternet Message Access ProtocolEmail access protocol
DNSDomain Name SystemDomain name resolution service
DHCPDynamic Host Configuration ProtocolAutomatic IP configuration
SNMPSimple Network Management ProtocolNetwork management and monitoring
ICMPInternet Control Message ProtocolNetwork diagnostic and error messaging
ARPAddress Resolution ProtocolMaps IP to MAC addresses
RARPReverse ARPMaps MAC to IP addresses
IGMPInternet Group Management ProtocolMulticast group management
MPLSMultiprotocol Label SwitchingHigh-performance routing method
TLSTransport Layer SecurityEncryption protocol
SSLSecure Sockets LayerPredecessor to TLS
FTPFile Transfer ProtocolProtocol for file transfers
SFTPSSH File Transfer ProtocolSecure file transfer protocol
SSHSecure ShellEncrypted remote access protocol
TelnetTelecommunication NetworkUnencrypted remote access (deprecated)
IRCInternet Relay ChatReal-time text chat protocol
LDAPLightweight Directory Access ProtocolDirectory services protocol
SMBServer Message BlockWindows file sharing protocol
NFSNetwork File SystemUnix/Linux file sharing protocol
RPCRemote Procedure CallDistributed computing protocol

TermFull FormDescription
IPInternet ProtocolCore network layer protocol
IPv4Internet Protocol version 432-bit IP addressing (e.g., 192.168.1.1)
IPv6Internet Protocol version 6128-bit IP addressing
IP AddressInternet Protocol AddressNumerical network identifier
Public IPPublic Internet Protocol AddressGlobally unique IP address
Private IPPrivate Internet Protocol AddressInternal network IP (RFC 1918)
Static IPStatic Internet Protocol AddressManually assigned, doesn’t change
Dynamic IPDynamic Internet Protocol AddressAutomatically assigned, can change
DHCPDynamic Host Configuration ProtocolAutomatic IP assignment
MAC AddressMedia Access Control AddressPhysical hardware address
NICNetwork Interface CardHardware for network connection
ARPAddress Resolution ProtocolIP to MAC resolution
RARPReverse Address Resolution ProtocolMAC to IP resolution
NATNetwork Address TranslationPrivate to public IP translation
CIDRClassless Inter-Domain RoutingIP address notation (e.g., /24)
/8Slash 8CIDR notation for Class A (16M addresses)
/16Slash 16CIDR notation for Class B (65K addresses)
/24Slash 24CIDR notation for Class C (256 addresses)
Subnet MaskSubnet MaskDefines network/host portions of IP
Default GatewayDefault GatewayRouter for external traffic
DNS ServerDomain Name System ServerResolves domain names to IPs
LoopbackLoopback Address127.0.0.1 - self-referencing IP
APIPAAutomatic Private IP Addressing169.254.0.0/16 - link-local addresses

TermFull FormDescription
SubnetSubnetworkSmaller network segment
SubnettingSubnettingDividing network into smaller subnets
VLSMVariable Length Subnet MaskingSubnets of different sizes
CIDRClassless Inter-Domain RoutingAddress allocation method
SupernettingSupernettingCombining smaller networks
Network AddressNetwork AddressFirst IP in subnet (identifies the network)
Broadcast AddressBroadcast AddressLast IP in subnet (sends to all hosts)
Host AddressHost AddressUsable IP addresses in subnet
Subnet MaskSubnet MaskDetermines network/host boundary
Network BitsNetwork BitsBits representing network portion
Host BitsHost BitsBits representing host portion
Prefix LengthPrefix LengthCIDR notation (e.g., /24)
Borrowed BitsBorrowed BitsBits taken from host for subnets
Valid HostsValid HostsUsable IP addresses in subnet
Power of 2Power of 2Calculation: 2^n for subnets/hosts
CIDR BlockCIDR BlockRange of IP addresses in CIDR notation
IP RangeIP RangeStart and end IP addresses

TermFull FormDescription
DNSDomain Name SystemTranslates domain names to IP addresses
FQDNFully Qualified Domain NameComplete domain name (e.g., www.example.com.)
TLDTop-Level DomainLast part of domain (.com, .org, .net)
ccTLDCountry Code Top-Level DomainCountry-specific TLD (.uk, .de)
gTLDGeneric Top-Level DomainGeneral TLD (.com, .org, .net)
Root ServerRoot DNS ServerTop-level DNS server (.)
TLD ServerTop-Level Domain ServerManages TLD records
Authoritative DNSAuthoritative DNS ServerHas actual zone records
Recursive DNSRecursive DNS ServerResolves queries for clients
DNS ResolverDNS ResolverClient’s DNS server (usually ISP)
DNS CacheDNS CacheTemporary stored DNS records
TTLTime To LiveHow long DNS record is cached
A RecordAddress RecordMaps domain to IPv4 address
AAAA RecordQuad A RecordMaps domain to IPv6 address
CNAMECanonical Name RecordCreates alias to another domain
MX RecordMail Exchange RecordSpecifies mail servers
NS RecordName Server RecordDelegates DNS zone
SOA RecordStart of Authority RecordZone administrative info
TXT RecordText RecordStores arbitrary text data
PTR RecordPointer RecordReverse DNS lookup
SRV RecordService RecordSpecifies service location
CAA RecordCertification Authority AuthorizationSpecifies allowed CAs
DNSSECDNS Security ExtensionsAdds security to DNS
DNS QueryDNS QueryRequest for DNS resolution
Recursive QueryRecursive QueryFull resolution by DNS server
Iterative QueryIterative QueryStep-by-step resolution
DNS ZoneDNS ZonePortion of DNS namespace
Zone TransferZone TransferCopying DNS zone data
AXFRAuthoritative TransferFull zone transfer
IXFRIncremental Zone TransferPartial zone transfer

TermFull FormDescription
DHCPDynamic Host Configuration ProtocolAutomatic IP configuration
DORADiscover, Offer, Request, AcknowledgeFour-step DHCP process
DHCP ServerDHCP ServerAssigns IP addresses to clients
DHCP ClientDHCP ClientRequests IP configuration
IP LeaseIP LeaseTemporary assignment of IP address
Lease TimeLease TimeDuration of IP address assignment
DHCP ScopeDHCP ScopeRange of IP addresses for assignment
DHCP PoolDHCP PoolCollection of available IPs
ReservationDHCP ReservationFixed IP for specific MAC
Scope OptionsDHCP Scope OptionsDNS, gateway, etc.
DHCP RelayDHCP Relay AgentForwards DHCP across routers
IP HelperIP HelperCisco term for DHCP relay
DHCPNAKDHCP Negative AcknowledgmentServer rejects request
DHCPDISCOVERDHCP DiscoverClient broadcasts to find server
DHCPOFFERDHCP OfferServer offers IP to client
DHCPREQUESTDHCP RequestClient requests offered IP
DHCPACKDHCP AcknowledgmentServer confirms lease
DHCPDECLINEDHCP DeclineClient rejects offered IP
DHCPRELEASEDHCP ReleaseClient releases IP early
DHCPINFORMDHCP InformClient requests configuration
T1 TimeRenewal Time50% of lease - renewal attempt
T2 TimeRebinding Time87.5% of lease - rebroadcast
BOOTPBootstrap ProtocolPredecessor to DHCP
PXEPreboot Execution EnvironmentNetwork boot protocol

TermFull FormDescription
NATNetwork Address TranslationTranslates private to public IPs
PATPort Address TranslationMany-to-one NAT using ports
SNATSource Network Address TranslationTranslates source IP
DNATDestination Network Address TranslationTranslates destination IP
Static NATStatic NATOne-to-one IP mapping
Dynamic NATDynamic NATMany-to-many IP mapping
NAT OverloadNAT OverloadSee PAT
MasqueradingIP MasqueradingLinux term for PAT
Port ForwardingPort ForwardingRedirects port to internal host
DMZDemilitarized ZoneIsolated network for public services
HairpinningNAT HairpinningTraffic exiting same interface it entered
NAT TraversalNAT TraversalTechniques to work through NAT
Full Cone NATFull Cone NATLeast restrictive NAT type
Restricted Cone NATRestricted Cone NATRestricts by IP only
Port-Restricted Cone NATPort-Restricted Cone NATRestricts by IP and port
Symmetric NATSymmetric NATMost restrictive, port depends on destination
STUNSession Traversal Utilities for NATNAT type detection
TURNTraversal Using Relays around NATRelay server for NAT traversal
ICEInteractive Connectivity EstablishmentNAT traversal method
Hole PunchingNAT Hole PunchingCreating pinholes in NAT
UPnPUniversal Plug and PlayAutomatic port forwarding
PCPPort Control ProtocolModern port forwarding protocol

TermFull FormDescription
RouterRouterDevice that forwards packets between networks
Routing TableRouting TableDatabase of routes
Default RouteDefault RouteCatch-all route (0.0.0.0/0)
Static RouteStatic RouteManually configured route
Dynamic RouteDynamic RouteLearned via routing protocol
Route MetricRoute MetricCost value for route selection
Routing ProtocolRouting ProtocolProtocol for dynamic routing
IGPInterior Gateway ProtocolRouting within an AS
EGPExterior Gateway ProtocolRouting between ASes
ASAutonomous SystemCollection of networks under one administration
BGPBorder Gateway ProtocolInternet routing protocol
OSPFOpen Shortest Path FirstLink-state IGP
EIGRPEnhanced Interior Gateway Routing ProtocolCisco hybrid IGP
RIPRouting Information ProtocolDistance-vector IGP
IS-ISIntermediate System to Intermediate SystemLink-state IGP
LSALink State AdvertisementOSPF routing information
LSDBLink State DatabaseOSPF topology database
SPFShortest Path FirstOSPF path calculation algorithm
ABRArea Border RouterOSPF router connecting areas
ASBRAutonomous System Boundary RouterOSPF router connecting to other AS
DRDesignated RouterOSPF representative on multi-access network
BDRBackup Designated RouterOSPF DR backup
Area 0Backbone AreaOSPF backbone area
NeighborRouting NeighborAdjacent router
AdjacencyRouting AdjacencyFormed between neighboring routers
ConvergenceNetwork ConvergenceAll routers have consistent routing info
Loop PreventionLoop PreventionMechanisms to prevent routing loops
Split HorizonSplit HorizonRouting loop prevention technique
Poison ReversePoison ReverseAdvertises infinite metric
Count to InfinityCount to InfinityRouting loop problem in distance-vector
Maximum Hop CountMaximum Hop CountRIP’s loop prevention (16 hops)
Route SummarizationRoute SummarizationCombining routes into single advertisement
Route AggregationRoute AggregationSee Route Summarization
Longest MatchLongest Prefix MatchMost specific route wins
Administrative DistanceAdministrative DistanceRoute preference in Cisco
Route PreferenceRoute PreferenceRoute preference in Linux
Next HopNext HopNext router in path
GatewayGatewayRouter interface
Routing CacheRouting CacheCached routing decisions

TermFull FormDescription
FirewallFirewallNetwork security device
Packet FilterPacket FilterBasic firewall filtering
Stateful FirewallStateful FirewallTracks connection state
Stateless FirewallStateless FirewallDoesn’t track connections
Application FirewallApplication FirewallLayer 7 filtering
NGFWNext-Generation FirewallAdvanced firewall with DPI
WAFWeb Application FirewallProtects web applications
UTMUnified Threat ManagementAll-in-one security appliance
ACLAccess Control ListList of allow/deny rules
RuleFirewall RuleIndividual filter condition
PolicySecurity PolicySet of firewall rules
AllowAllowPermit traffic
DenyDenyBlock traffic
DropDropSilently discard packet
RejectRejectDiscard and send error
LogLogRecord firewall event
InboundInboundTraffic entering network
OutboundOutboundTraffic leaving network
IngressIngressSee Inbound
EgressEgressSee Outbound
PortPortLogical connection point
ProtocolProtocolTCP, UDP, ICMP, etc.
Source IPSource IPOriginating IP address
Destination IPDestination IPTarget IP address
Source PortSource PortOriginating port
Destination PortDestination PortTarget port
SYNSynchronizeTCP connection start flag
ACKAcknowledgmentTCP confirmation flag
FINFinishTCP connection end flag
RSTResetTCP connection reset
PSHPushTCP push data flag
URGUrgentTCP urgent data flag
Stateful InspectionStateful InspectionTracks connection state
Deep Packet InspectionDeep Packet InspectionExamines packet content
DMZDemilitarized ZoneIsolated network segment
ZoneFirewall ZoneGroup of interfaces with same policy
iptablesiptablesLinux packet filtering tool
nftablesnftablesLinux packet filtering tool (newer)
firewalldfirewalldDynamic firewall manager
UFWUncomplicated FirewallSimplified iptables
pfPacket FilterBSD/macOS firewall
UTMUnified Threat ManagementMulti-function security

TermFull FormDescription
VPNVirtual Private NetworkEncrypted tunnel over public network
Remote Access VPNRemote Access VPNIndividual user connection
Site-to-Site VPNSite-to-Site VPNNetwork-to-network connection
SSL VPNSSL VPNVPN using SSL/TLS
IPSecIP SecurityVPN encryption protocol suite
PPTPPoint-to-Point Tunneling ProtocolLegacy VPN protocol
L2TPLayer 2 Tunneling ProtocolVPN tunneling protocol
L2TP/IPsecL2TP with IPsecCombined L2TP and IPsec
OpenVPNOpenVPNOpen-source VPN solution
WireGuardWireGuardModern, lightweight VPN
TunnelVPN TunnelEncrypted connection path
EncapsulationEncapsulationWrapping data in protocol headers
EncryptionEncryptionData encoding for security
Tunnel ModeIPsec Tunnel ModeEncrypts entire IP packet
Transport ModeIPsec Transport ModeEncrypts only payload
AHAuthentication HeaderIPsec authentication
ESPEncapsulating Security PayloadIPsec encryption
IKEInternet Key ExchangeIPsec key exchange
SASecurity AssociationIPsec security parameters
Pre-Shared KeyPre-Shared KeyShared secret for encryption
CertificateDigital CertificateIdentity verification
PKIPublic Key InfrastructureCertificate management system
Split TunnelingSplit TunnelingOnly tunnel specific traffic
Full TunnelFull TunnelAll traffic through VPN
Dead Peer DetectionDead Peer DetectionDetect VPN peer failure
NAT TraversalNAT TraversalWork through NAT devices
MPLS VPNMPLS VPNVPN using MPLS backbone
VPDNVirtual Private Dialup NetworkDial-up VPN
Tunnel InterfaceTunnel InterfaceVirtual VPN interface

TermFull FormDescription
WiFiWireless FidelityWireless networking technology
WLANWireless Local Area NetworkWireless network
SSIDService Set IdentifierWireless network name
BSSIDBasic Service Set IdentifierAccess Point MAC address
ESSIDExtended Service Set IdentifierMultiple APs network name
APAccess PointWireless network device
STAStationWireless client device
IBSSIndependent Basic Service SetAd-hoc mode
BSSBasic Service SetInfrastructure mode
ESSExtended Service SetMultiple BSS
Ad-HocAd-Hoc ModeDevice-to-device network
Infrastructure ModeInfrastructure ModeAP-based network
2.4 GHz2.4 GigahertzCommon WiFi frequency band
5 GHz5 GigahertzHigher frequency WiFi band
6 GHz6 GigahertzWiFi 6E frequency band
ChannelWireless ChannelSpecific frequency within band
Channel WidthChannel WidthBandwidth of wireless channel
BandwidthBandwidthData transmission capacity
FrequencyFrequencyRadio wave oscillation rate
Signal StrengthSignal StrengthReceived signal power
RSSIReceived Signal Strength IndicatorSignal power measurement
dBmDecibel-milliwattsPower measurement unit
SNRSignal-to-Noise RatioSignal quality measurement
ModulationModulationEncoding data on radio wave
QAMQuadrature Amplitude ModulationComplex modulation
OFDMOrthogonal Frequency-Division MultiplexingMulti-carrier modulation
MU-MIMOMulti-User MIMOMultiple simultaneous users
MIMOMultiple Input Multiple OutputMultiple antennas
BeamformingBeamformingSignal direction optimization
802.11aIEEE 802.11aWiFi standard (5 GHz, 54 Mbps)
802.11bIEEE 802.11bWiFi standard (2.4 GHz, 11 Mbps)
802.11gIEEE 802.11gWiFi standard (2.4 GHz, 54 Mbps)
802.11nIEEE 802.11nWiFi standard (WiFi 4)
802.11acIEEE 802.11acWiFi standard (WiFi 5)
802.11axIEEE 802.11axWiFi standard (WiFi 6)
WiFi 4WiFi 4802.11n marketing name
WiFi 5WiFi 5802.11ac marketing name
WiFi 6WiFi 6802.11ax marketing name
WiFi 6EWiFi 6E802.11ax with 6 GHz
WEPWired Equivalent PrivacyLegacy WiFi security
WPAWiFi Protected AccessImproved WiFi security
WPA2WiFi Protected Access IICurrent standard security
WPA3WiFi Protected Access IIINewest WiFi security
PSKPre-Shared KeyWiFi password
AESAdvanced Encryption StandardEncryption algorithm
TKIPTemporal Key Integrity ProtocolLegacy encryption
CCMPCounter Mode with CBC-MAC ProtocolWPA2 encryption
SAESimultaneous Authentication of EqualsWPA3 authentication
PMFProtected Management FramesWPA2 security feature
WPSWiFi Protected SetupEasy setup method

TermFull FormDescription
LBLoad BalancerDistributes traffic across servers
SLBServer Load BalancerSee Load Balancer
CLBClassic Load BalancerAWS legacy LB
ALBApplication Load BalancerLayer 7 LB
NLBNetwork Load BalancerLayer 4 LB
GLBGateway Load BalancerThird-party appliance LB
Layer 4 LBLayer 4 Load BalancerTransport layer balancing
Layer 7 LBLayer 7 Load BalancerApplication layer balancing
L4Layer 4Transport layer
L7Layer 7Application layer
Round RobinRound RobinSequential distribution
Least ConnectionsLeast ConnectionsFewest active connections
Least Response TimeLeast Response TimeFastest response
IP HashIP HashSource IP-based distribution
WeightedWeightedBased on server capacity
RandomRandomRandom distribution
Health CheckHealth CheckServer availability test
Active Health CheckActive Health CheckProactive testing
Passive Health CheckPassive Health CheckOn-request testing
HTTP CheckHTTP Health CheckWeb-based health test
TCP CheckTCP Health CheckPort-based health test
ICMP CheckICMP Health CheckPing-based health test
SSL TerminationSSL TerminationDecrypt at load balancer
SSL OffloadingSSL OffloadingSee SSL Termination
Session PersistenceSession PersistenceSame server for session
Sticky SessionSticky SessionSee Session Persistence
Cookie InsertCookie InsertLB adds session cookie
Cookie PrefixCookie PrefixEncoded session in cookie
Source IP AffinitySource IP AffinitySame IP to same server
Server PoolServer PoolGroup of backend servers
BackendBackendServers behind load balancer
FrontendFrontendClient-facing side
Backend ServerBackend ServerActual application server
Pool MemberPool MemberIndividual server in pool
Virtual IPVirtual IPShared IP for pool
VIPVirtual IPSee Virtual IP
HAHigh AvailabilityRedundant systems
FailoverFailoverAutomatic backup activation
Active-ActiveActive-ActiveMultiple active instances
Active-PassiveActive-PassivePrimary and standby
QuorumQuorumRequired majority for operation
KeepalivedKeepalivedLinux HA solution
VRRPVirtual Router Redundancy ProtocolRouter HA protocol
PACProxy Auto-ConfigurationBrowser proxy settings

TermFull FormDescription
VLANVirtual Local Area NetworkLogical network segment
VLAN IDVLAN Identifier12-bit VLAN number (1-4094)
VLAN TagVLAN Tag802.1Q marker in frame
802.1QIEEE 802.1QVLAN tagging standard
Native VLANNative VLANUntagged traffic on trunk
Voice VLANVoice VLANSeparate VLAN for VoIP
Management VLANManagement VLANNetwork device management
Data VLANData VLANUser traffic VLAN
Private VLANPrivate VLANPort isolation within VLAN
Community VLANCommunity VLANPVLAN with inter-port communication
Isolated VLANIsolated VLANPVLAN with no inter-port communication
TrunkTrunk LinkCarries multiple VLANs
Trunk PortTrunk PortSwitch port for trunk
Access PortAccess PortSingle VLAN port
UplinkUplinkConnection to another switch
DownlinkDownlinkConnection to end devices
VTPVLAN Trunking ProtocolCisco VLAN management
VTP DomainVTP DomainGroup of switches with same VTP
VTP ServerVTP ServerCreates/modifies VLANs
VTP ClientVTP ClientLearns VLANs from server
VTP TransparentVTP TransparentIndependent VLAN database
DTPDynamic Trunking ProtocolCisco auto-trunking
VLAN TrunkingVLAN TrunkingCarrying multiple VLANs
Inter-VLAN RoutingInter-VLAN RoutingRouting between VLANs
Router-on-a-StickRouter-on-a-StickSingle interface, multiple subinterfaces
L3 SwitchLayer 3 SwitchSwitch with routing capability
SVISwitch Virtual InterfaceVirtual router interface
VLAN InterfaceVLAN InterfaceSee SVI
BridgeBridgeLayer 2 forwarding device
Bridge VLANBridge VLANBridge member ports
VXLANVirtual Extensible LANLayer 3 overlay for VLANs
VNIVXLAN Network Identifier24-bit VXLAN ID
NVGRENetwork Virtualization using GREMicrosoft overlay technology
GeneveGeneric Network Virtualization EncapsulationModern overlay protocol
MSTPMultiple Spanning Tree ProtocolVLAN-aware STP
STPSpanning Tree ProtocolLoop prevention protocol
RSTPRapid Spanning Tree ProtocolFast STP
PVSTPer-VLAN Spanning TreeCisco per-VLAN STP

TermFull FormDescription
VPCVirtual Private CloudIsolated virtual network in cloud
VNetVirtual NetworkAzure’s VPC equivalent
SubnetCloud SubnetLogical subdivision of VPC
Public SubnetPublic SubnetHas internet access
Private SubnetPrivate SubnetNo direct internet
Availability ZoneAvailability ZoneIsolated data center
AZAvailability ZoneSee Availability Zone
RegionCloud RegionGeographic cloud area
Edge LocationEdge LocationCDN cache location
Internet GatewayInternet GatewayVPC internet access
Egress-Only IGWEgress-Only Internet GatewayIPv6 internet access
NAT GatewayNAT GatewayManaged NAT service
NAT InstanceNAT InstanceSelf-managed NAT
Security GroupSecurity GroupInstance-level firewall
NACLNetwork Access Control ListSubnet-level firewall
SGSecurity GroupSee Security Group
Network ACLNetwork Access Control ListSee NACL
Route TableRoute TableDetermines traffic path
Network ACLNetwork Access Control ListStateless subnet rules
PeeringVPC PeeringDirect VPC connection
VPC PeeringVPC PeeringSee Peering
Transit GatewayTransit GatewayCentral hub for VPCs
TGWTransit GatewaySee Transit Gateway
Direct ConnectDirect ConnectDedicated AWS connection
ExpressRouteExpressRouteAzure dedicated connection
Cloud VPNCloud VPNVPN to cloud
VPN ConnectionVPN ConnectionIPSec tunnel to VPC
Customer GatewayCustomer GatewayOn-premises VPN device
Virtual Private GatewayVirtual Private GatewayAWS VPN endpoint
VPGVirtual Private GatewaySee Virtual Private Gateway
CGWCustomer GatewaySee Customer Gateway
AWS VPNAWS VPNAWS VPN service
Azure VPN GatewayAzure VPN GatewayAzure VPN service
Cloud DNSCloud DNSManaged DNS service
Private DNSPrivate DNSInternal DNS resolution
Private Hosted ZonePrivate Hosted ZoneRoute 53 private zone
Route 53Amazon Route 53AWS DNS service
Cloud CDNCloud CDNContent delivery network
CloudFrontAmazon CloudFrontAWS CDN
ELBElastic Load BalancingAWS load balancer
ALBApplication Load BalancerLayer 7 AWS LB
NLBNetwork Load BalancerLayer 4 AWS LB
Auto ScalingAuto ScalingAutomatic capacity adjustment
ASGAuto Scaling GroupCollection of instances
IAM RoleIAM RoleCloud access permissions
Instance ProfileInstance ProfileEC2 IAM role
Placement GroupPlacement GroupCluster of instances
ENIElastic Network InterfaceVirtual network interface
EIPElastic IPStatic public IP
Secondary IPSecondary IPAdditional IP address
VPC EndpointVPC EndpointPrivate connection to service
Gateway EndpointGateway EndpointS3/DynamoDB endpoint
Interface EndpointInterface EndpointPrivateLink endpoint
PrivateLinkPrivateLinkAWS private connectivity

TermFull FormDescription
LANLocal Area NetworkLocal network (building/campus)
WANWide Area NetworkGeographic network
MANMetropolitan Area NetworkCity-scale network
PANPersonal Area NetworkPersonal device network
CANCampus Area NetworkUniversity/campus network
SANStorage Area NetworkDedicated storage network
VPNVirtual Private NetworkEncrypted tunnel network
BandwidthBandwidthData transfer capacity
LatencyLatencyData transfer delay
JitterJitterVariation in latency
Packet LossPacket LossDropped data packets
ThroughputThroughputActual data transfer rate
MTUMaximum Transmission UnitLargest packet size
Jumbo FrameJumbo FrameLarge MTU (9000 bytes)
DuplexDuplexCommunication direction
Full DuplexFull DuplexBidirectional communication
Half DuplexHalf DuplexOne-way communication
CollisionNetwork CollisionData packet collision
Collision DomainCollision DomainArea where collisions occur
Broadcast DomainBroadcast DomainArea receiving broadcasts
CSMA/CDCarrier Sense Multiple Access with Collision DetectionEthernet access method
MAC AddressMedia Access Control AddressPhysical address
OUIOrganizationally Unique IdentifierMAC address manufacturer ID
UplinkUplinkUpstream connection
DownlinkDownlinkDownstream connection
Patch PanelPatch PanelCable management panel
RackServer RackEquipment mounting frame
SwitchNetwork SwitchMulti-port bridging device
RouterNetwork RouterLayer 3 forwarding device
GatewayNetwork GatewayNetwork entry/exit point
HubNetwork HubMulti-port repeater (deprecated)
BridgeNetwork BridgeConnects two network segments
NICNetwork Interface CardNetwork adapter
GBICGigabit Interface ConverterSwappable transceiver
SFPSmall Form-Factor PluggableOptical transceiver
SFP+SFP Plus10G transceiver
QSFPQuad SFP40G transceiver
DACDirect Attach CableTwinaxial cable
AOCActive Optical CableOptical cable assembly
FiberOptical FiberGlass/plastic cable for light transmission
Single ModeSingle Mode FiberLong-distance fiber
Multi ModeMulti Mode FiberShort-distance fiber
UTPUnshielded Twisted PairCommon copper cable
STPShielded Twisted PairShielded copper cable
Cat5eCategory 5e1 Gbps copper cable
Cat6Category 610 Gbps copper cable
Cat6aCategory 6a10 Gbps, 55m copper cable
Cat7Category 710 Gbps, shielded copper
Cat8Category 825-40 Gbps copper cable
PoEPower over EthernetPower over network cable
PoE+Power over Ethernet PlusHigher power PoE
PoE++Power over Ethernet Plus PlusHighest power PoE
UPOEUniversal Power over EthernetCisco PoE standard
QoSQuality of ServiceTraffic prioritization
TOSType of ServiceQoS field in IP header
DSCPDifferentiated Services Code PointQoS marking
CoSClass of ServiceLayer 2 QoS
Traffic ShapingTraffic ShapingRate limiting
Traffic PolicingTraffic PolicingDrop or mark exceeding traffic
Rate LimitingRate LimitingBandwidth restriction
Port MirroringPort MirroringTraffic duplication for analysis
SPANSwitched Port AnalyzerCisco port mirroring
RSPANRemote SPANRemote port mirroring
ERSPANEncapsulated Remote SPANEncrypted remote mirroring
NetFlowNetFlowTraffic analysis protocol
sFlowsFlowSampled flow monitoring
IPFIXIP Flow Information ExportFlow export standard
RADIUSRemote Authentication Dial-In User ServiceAAA protocol
TACACS+Terminal Access Controller Access-Control System PlusCisco AAA protocol
LDAPLightweight Directory Access ProtocolDirectory service protocol
KerberosKerberosNetwork authentication protocol
SSOSingle Sign-OnOne login for multiple services
MFAMulti-Factor AuthenticationMultiple verification methods
2FATwo-Factor AuthenticationTwo-step verification
802.1XIEEE 802.1XPort-based network access control
NACNetwork Access ControlEndpoint security policy
ARP SpoofingARP SpoofingARP poisoning attack
MAC FloodingMAC FloodingSwitch table overflow
VLAN HoppingVLAN HoppingVLAN attack technique
Rogue DHCPRogue DHCPUnauthorized DHCP server
DHCP SnoopingDHCP SnoopingDHCP attack prevention
DAIDynamic ARP InspectionARP attack prevention
IPSGIP Source GuardIP spoofing prevention
ACLAccess Control ListPermission list
AAAAuthentication, Authorization, AccountingSecurity framework
RTORecovery Time ObjectiveMax downtime acceptable
RPORecovery Point ObjectiveMax data loss acceptable
HAHigh AvailabilityRedundant systems
DRDisaster RecoveryRecovery from disasters
BCPBusiness Continuity PlanningOperational continuity
SLAService Level AgreementService guarantee

Last Updated: February 2026