In the context of computing and technology, a network refers to a collection of interconnected devices, such as computers, servers, routers, and switches, that are linked together to facilitate communication and data sharing. Networks can be classified into different types, such as local area networks (LANs), wide area networks (WANs), and the internet.
Here are some important network-related abbreviations:
1 | AAA | Authentication Authorization and Accounting |
2 | ACL | Access Control List |
3 | ADSL | Asymmetric Digital Subscriber Line |
4 | AES | Advanced Encryption Standard |
5 | AH | Authentication Header |
6 | AM | Amplitude Modulation |
7 | APIPA | Automatic Private Internet Protocol Addressing |
8 | ARIN | American Registry for Internet Numbers |
9 | ARP | Address Resolution Protocol |
10 | AS | Autonomous System |
11 | ASP | Application Service Provider |
12 | ATM | Asynchronous Transfer Mode |
13 | BERT | Bit-Error Rate Test |
14 | BGP | Border Gateway Protocol |
15 | BNC | British Naval Connector / Bayonet Niell-Concelman |
16 | BootP | Boot Protocol /Bootstrap Protocol |
17 | BPDU | Bridge Protocol Data Unit |
18 | BRI | Basic Rate Interface |
19 | BSSID | Basic Service Set Identifier |
20 | CAM | Channel Access Method |
21 | CARP | Common Address Redundancy Protocol |
22 | CCTV | Closed Capkon TV |
23 | CHAP | Challenge Handshake Authentication Protocol |
24 | CIDR | Classless inter domain routing |
25 | CNAME | Canonical Name |
26 | CRAM-MD5 | Challenge-Response Authentication Mechanism – Message Digest 5 |
27 | CSMA / CA | Carrier Sense Multiple Access / Collision Avoidance |
28 | CSMA / CD | Carrier Sense Multiple Access / Collision Detection |
29 | CSU | Channel Service Unit |
30 | dB | decibels |
31 | DHCP | Dynamic Host Configuration Protocol |
32 | DLC | Data Link Control |
33 | DMZ | Demilitarized Zone |
34 | DNS | Domain Name Service / Domain Name Server / Domain Name System |
35 | DOCSIS | Data-Over-Cable Service Interface Specification |
36 | DoS | Denial of Service |
37 | DDoS | Distributed Denial of Service |
38 | DSL | Digital Subscriber Line |
39 | DSSS | Direct Sequence Spread Spectrum |
40 | DSU | Data Service Unit |
41 | DWDM | Dense Wavelength Division Multiplexing |
42 | E1 | E-Carrier Level 1 |
43 | EAP | Extensible Authentication Protocol |
44 | EDNS | Extension Mechanisms for DNS |
45 | EGP | Exterior Gateway Protocol |
46 | EIGRP | Enhanced Interior Gateway Routing Protocol |
47 | EMI | Electromagnetic Interference |
48 | ESD | Electrostatic Discharge |
49 | ESSID | Extended Service Set Identifier |
50 | ESP | Encapsulated security packets |
51 | FDDI | Fiber Distributed Data Interface |
52 | FDM | Frequency Division Multiplexing |
53 | FHSS | Frequency Hopping Spread Spectrum |
54 | FM | Frequency Modulation |
55 | FQDN | Fully Qualified Domain Name / Fully Qualified Distinguished Name |
56 | FTP | File Transfer Protocol |
57 | FTPS | File Transfer Protocol Security |
58 | GBIC | Gigabit Interface Converter |
59 | Gbps | Giga bits per second |
60 | GPG | GNU Privacy Guard |
61 | HDLC | High-Level Data Link Control |
62 | HIDS | Host Intrusion Detection System |
63 | HIPS | Host Intrusion Prevention System |
64 | HSPA | High Speed Packet Access |
65 | HSRP | Hot Standby Router Protocol |
66 | HTTP | Hypertext Transfer Protocol |
67 | HTTPS | Hypertext Transfer Protocol Secure |
68 | Hz | Hertz |
69 | IANA | Internet Assigned Numbers Authority |
70 | ICA | Independent Computer Architecture |
71 | ICANN | Internet Corporation for Assigned Names and Numbers |
72 | ICMP | Internet Control Message Protocol |
73 | ICS | Internet Connection Sharing |
74 | IDF | Intermediate Distribution Frame |
75 | IDS | Intrusion Detection System |
76 | IEEE | Institute of Electrical and Electronics Engineers |
77 | IGMP | Internet Group Multicast Protocol |
78 | IGP | Interior Gateway Protocol |
79 | IIS | Internet Information Services |
80 | IKE | Internet Key Exchange |
81 | IMAP4 | Internet Message Access Protocol version 4 |
82 | InterNIC | Internet Network Information Center |
83 | IP | Internet Protocol |
84 | IPS | Intrusion Prevention System |
85 | IPSec | Internet Protocol Security |
86 | IPv4 | Internet Protocol version 4 |
87 | IPv6 | Internet Protocol version 6 |
88 | ISAKMP | Internet Security Association and Key Management Protocol |
89 | ISDN | Integrated Services Digital Network |
90 | ISP | Internet Service Provider |
91 | IT | Information Technology |
92 | IV | Initialization Vector |
93 | Kbps | Kilobits per second |
94 | L2F | Layer 2 Forwarding |
95 | L2TP | Layer 2 Tunneling Protocol |
96 | LACP | Link aggregation control protocol |
97 | LAN | Local Area Network |
98 | LC | Local Connector |
99 | LDAP | Lightweight Directory Access Protocol |
100 | LEC | Local Exchange Carrier |
101 | LED | Light Emitting Diode |
102 | LLC | Logical Link Control |
103 | MAC | Media Access Control / Medium Access Control |
104 | Mbps | Megabits per second |
105 | MBps | Megabytes per second |
106 | MDF | Main Distribution Frame |
107 | MDI | Media Dependent Interface |
108 | MDIX | Media Dependent Interface Crossover |
109 | MIB | Management Information Base |
110 | MIMO | Multiple Input, Multiple Output |
111 | MMF | Multimode Fiber |
112 | MPLS | Multi-Protocol Label Switching |
113 | MS-CHAP | Microsoft Challenge Handshake Authentication Protocol |
114 | MT-RJ | Mechanical Transfer-Registered Jack |
115 | MX | Mail Exchanger |
116 | NAC | Network Access Control |
117 | NaaS | Network as a Service |
118 | NAS | Network Attached Storage |
119 | NAT | Network Address Translation |
120 | NCP | Network Control Protocol |
121 | NetBEUI | Network Basic Input / Output Extended User Interface |
122 | NetBIOS | Network Basic Input / Output System |
123 | NFS | Network File Service |
124 | NIC | Network Interface Card |
125 | NIDS | Network Intrusion Detection System |
126 | NIPS | Network Intrusion Prevention System |
127 | nm | Nanometer |
128 | NNTP | Network News Transport Protocol |
129 | NTP | Network Time Protocol |
130 | NWLINK | Microsoft IPX/SPX Protocol |
131 | OCx | Optical Carrier |
132 | OS | Operating Systems |
133 | OSI | Open Systems Interconnect |
134 | OSPF | Open Shortest Path First |
135 | OTDR | Optical Time Domain Reflectometer |
136 | PAP | Password Authentication Protocol |
137 | PAT | Port Address Translation |
138 | PC | Personal Computer |
139 | PDU | Protocol Data Unit |
140 | PGP | Pretty Good Privacy |
141 | PKI | Public Key Infrastructure |
142 | PoE | Power over Ethernet |
143 | POP3 | Post Office Protocol version 3 |
144 | POTS | Plain Old Telephone System |
145 | PPP | Point-to-Point Protocol |
146 | PPPoE | Point-to-Point Protocol over Ethernet |
147 | PPTP | Point-to-Point Tunneling Protocol |
148 | PRI | Primary Rate Interface |
149 | PSTN | Public Switched Telephone Network |
150 | PVC | Permanent Virtual Circuit |
151 | QoS | Quality of Service |
152 | RADIUS | Remote Authentication Dial-In User Service |
153 | RARP | Reverse Address Resolution Protocol |
154 | RAS | Remote Access Service |
155 | RDP | Remote Desktop Protocol |
156 | RFI | Radio Frequency Interface |
157 | RG | Radio Guide |
158 | RIP | Routing Internet Protocol |
159 | RJ | Registered Jack |
160 | RSA | Rivest, Shamir, Adelman |
161 | RSH | Remote Shell |
162 | RTP | Real Time Protocol |
163 | RTSP | Real Time Streaming Protocol |
164 | RTT | Round Trip Time or Real Transfer Time |
165 | SA | Security Association |
166 | SC | Standard Connector / Subscriber Connector |
167 | SCP | Secure Copy Protocol |
168 | SDSL | Symmetrical Digital Subscriber Line |
169 | SFTP | Secure File Transfer Protocol |
170 | SFP | Small Form-factor Pluggable |
171 | SIP | Session Initiation Protocol |
172 | SLIP | Serial Line Internet Protocol |
173 | SMF | Single Mode Fiber |
174 | SMTP | Simple Mail Transfer Protocol |
175 | SNAT | Static Network Address Translation |
176 | SNMP | Simple Network Management Protocol |
177 | SNTP | Simple Network Time Protocol |
178 | SOA | Start of Authority |
179 | SOHO | Small Office / Home Office |
180 | SONET | Synchronous Optical Network |
181 | SPS | Standby Power Supply |
182 | SSH | Secure Shell |
183 | SSID | Service Set Identifier |
184 | SSL | Secure Sockets Layer |
185 | ST | Straight Tip or Snap Twist |
186 | STP | Spanning Tree Protocol |
187 | STP | Shielded Twisted Pair |
188 | SVC | Switched Virtual Connection |
189 | T1 | T-Carrier Level 1 |
190 | TA | Terminal Adaptor |
191 | TACACS+ | Terminal Access Control Access Control System+ |
192 | TCP | Transmission Control Protocol |
193 | TCP / IP | Transmission Control Protocol / Internet Protocol |
194 | TDM | Time Division Multiplexing |
195 | TDR | Time Domain Reflectometer |
196 | Telco | Telephone Company |
197 | TFTP | Trivial File Transfer Protocol |
198 | TKIP | Temporal Key Integrity Protocol |
199 | TLS | Transport Layer Security |
200 | TTL | Time to Live |
201 | UDP | User Datagram Protocol |
202 | UNC | Universal Naming Convention |
203 | UPS | Uninterruptible Power Supply |
204 | URL | Uniform Resource Locator |
205 | USB | Universal Serial Bus |
206 | UTP | Unshielded Twisted Pair |
207 | VDSL | Variable Digital Subscriber Line |
208 | VLAN | Virtual Local Area Network |
209 | VNC | Virtual Network Connection |
210 | VoIP | Voice over IP |
211 | VPN | Virtual Private Network |
212 | VRRP | Virtual Router Redundancy Protocol |
213 | VTC | Video Teleconference |
214 | VTP | VLAN Trunk Protocol |
215 | WAN | Wide Area Network |
216 | WAP | Wireless Application Protocol / Wireless Access Point |
217 | WEP | Wired Equivalent Privacy |
218 | WINS | Window Internet Name Service |
219 | WLAN | Wireless Local Area Network |
220 | WPA | Wi-Fi Protected Access |
221 | www | World Wide Web |
222 | X.25 | CCITT Packet Switching Protocol |
223 | XML | eXtensible Markup Language |
224 | XDSL | Extended Digital Subscriber Line |
225 | Zeroconf | Zero Configuration |
You may also like:
- Top 10 Most Encryption Related Key Terms
- Top 10 Key Guidelines For Designing A Robust Web Application
- The Rise of Online Shopping – Convenience, Risks, and Safety Measures
- WiFi Suspended at Major UK Train Stations Following Cybersecurity Incident
- The Coolest GitHub Hack You Should Know
- How to Avoid Being a Victim of Cybercrime
- Top 9 Signs of Viruses in Your Computer
- How Cybercriminals Exploit Email and How to Protect Yourself
- 10 Different Types of Social Engineers
- Redis Cheatsheet – Essential Commands for Database Management