26 technical terms that every network engineer must know. Check yourself to see how much you know.

Insert image description here
When working as a network engineer, although it is difficult to remember those obscure English and technical terms,

For example, I am a little person who never fails in English, but you will find that you will use it a lot, so you still have to reserve some in your mind, and it will be OK if you have a little impression. It’s not convenient to check! So today we will pick the key points, these 26 technical terms, be sure to collect them~

01 LAN(Local Area Network)

Usually refers to a collection of computers, printers, modems or other devices within a few kilometers that can be interconnected through some kind of media.

02 MAN(Metropolitan Area Network)

MAN coverage is medium-sized, between LAN and WAN, usually a network connection within a city (distance is about 10KM).

03 WAN(Wide Area Network)

Distributed over long distances, it uses various types of serial connections to provide access over larger geographic areas.

04 Sneakernet

Sneakernet is considered the earliest form of networking, in which removable media (such as disks, tapes) were used to physically transmit data.

05 Peer-to-peer link

It refers to a direct connection between two computers on a network. A point-to-point connection does not require any other network equipment other than connecting cables to both computers' NIC cards.

06 Anonymous FTP

Anonymous FTP is a way of granting users access to files on a public server. Users allowed to access data in these servers do not need to identify themselves but log in as anonymous guests.

07 Data encapsulation

Data encapsulation is the process of breaking down information into smaller manageable chunks before transmitting it over a network. In this process, source and destination addresses are appended to the header along with parity.

08 Network topology

Network topology refers to the layout of a computer network. It shows the physical layout of the devices and cables, and how they connect to each other.

09 Access table

The access table is a series of rules added by the administrator to control the input and output of data packets in the router. It is not generated by the router itself. The access list can allow or prohibit data packets from entering or outputting the destination. There can be only one access list per protocol per interface.

10 Autonomous Systems (AS)

An autonomous system is a group of routers and networks under the control of a governing body. It can be a router directly connected to a LAN and also connected to the Internet; it can be multiple LANs interconnected by the enterprise backbone network.

All routers in an autonomous system must be connected to each other, run the same routing protocol, and be assigned the same autonomous system number. Links between autonomous systems use external routing protocols such as BGP.

11 BGP

BGP (Border Gateway Protocol) is a routing protocol that dynamically exchanges routing information between autonomous systems. The classic definition of an autonomous system is a group of routers under the control of a management organization that uses IGP and common metrics to forward messages to other autonomous systems.

The term autonomous system is used in BGP to emphasize the fact that the management of an autonomous system provides a unified internal routing plan for other autonomous systems, which provides a consistent routing plan for those networks reachable through it. describe.

12 NOS

NOS or Network Operating System is specialized software whose main task is to provide a network connection to a computer so that it can communicate with other computers and connected devices.

13 SLIP

SLIP or Serial Line Interface Protocol is actually an older protocol developed in the early days of UNIX. This is one of the protocols used for remote access.

14 ICMP

ICMP is the Internet Control Message Protocol. It provides messaging and communication for protocols within the TCP/IP protocol stack. This is also the protocol that manages error messages used by network tools such as PING.

15 ipconfig

Ipconfig is a utility commonly used to identify the address information of computers on a network. It can display the physical address as well as the IP address.

16 tunnel mode

This is a data exchange mode in which two communicating computers do not use IPSec themselves. Instead, the gateway that connects the LAN to the transit network creates a virtual tunnel that uses the IPSec protocol to protect all traffic passing through it.

17 RSA algorithm

RSA is the abbreviation of Rivest-Shamir-Adleman algorithm. It is currently the most commonly used public key encryption algorithm.

18 Multicast routing

Multicast routing is a form of targeted broadcast that sends a message to a selected group of users rather than sending it to all users on a subnet.

19 Split Horizontally

Split horizon is a technology that avoids the occurrence of routing loops and speeds up route aggregation. Since a router may receive routing information sent by itself, and this information is useless, split horizon technology does not reversely advertise any routing update information received from the terminal, but only advertises those that will not be cleared due to the count reaching infinity. routing.

20 measures

Measurement values ​​represent distances. They are used to determine the optimal route when searching for a route. When each routing algorithm generates a routing table, it will generate a numerical value (metric value) for each path through the network. The smallest value represents the optimal path. The calculation of the metric can only consider one characteristic of the path, but more complex metrics are generated by combining multiple characteristics of the path.

21 Management distance

Administrative distance refers to the routing credibility of a routing protocol. Each routing protocol is assigned a trust level in order from high to low reliability. This trust level is called administrative distance. For routing information from two different routing protocols to a destination, the router first decides which protocol to trust based on the administrative distance.

22 Distance vector routing protocol

Distance vector routing protocols are designed for small network environments. In a large network environment, this type of protocol will generate large traffic and occupy too much bandwidth when learning routes and maintaining routes.

Distance vector routing protocols use hop count as a metric to calculate the number of routers to reach a destination.

For example, RIP uses the Bellman-Ford algorithm to determine the shortest path, that is, the line that can reach the destination as long as it takes the smallest number of hops. The maximum number of hops allowed is usually set at 15. Endpoints that must go through more than 15 routers are considered unreachable.

There are several distance vector routing protocols: IP RIP, IPX RIP, Apple Talk RTMP and IGRP.

23 SD-WAN

SD-WAN, or software-defined wide area network, is a service formed by applying SDN technology to wide area network scenarios. This service is used to connect enterprise networks, data centers, Internet applications and cloud services across a wide geographical range. The typical feature of this kind of service is to "cloud" network control capabilities through software and support application-aware network capability exposure.

24 DNS

DNS is the abbreviation of Domain Name System. It is a distributed database on the Internet that maps domain names and IP addresses to each other. It allows users to access the Internet more conveniently without having to remember IP addresses that can be directly read by machines. .

DNS is also an integral part of many unified network security architectures and is a key component of public and private clouds, which means network engineers need to have a good understanding of how DNS works so that they can better troubleshoot network problems.

25 IoT

The Internet of Things (abbreviation: loT) is a network based on information carriers such as the Internet and traditional telecommunications networks, allowing all ordinary objects that can perform independent functions to achieve interconnection. Its application fields mainly include transportation and logistics, industrial manufacturing, health care, intelligent environment (home, office, factory), etc., and has very broad market prospects.

Network engineers not only need to size Internet of Things (IoT) wired and wireless networks to accommodate thousands or tens of thousands of IoT sensors, but they are also responsible for securing devices once they are connected to the corporate network.

26 Hyperconverged systems

Hyperconvergence is the integration of computing, data storage and network functions into a unified system. Network engineers need to understand the management tools used to deploy and operate hyperconverged systems and understand how hyperconverged systems work from one end of the technology stack to the other so that the systems are optimized for the applications running on them.

What other technical terms do you think you need to know as a network engineer? Tell me in the comment area and I’ll fill it up for you

In addition, network engineering study materials have been prepared for everyone, as follows:
①Network engineering videos and course notes
②Written interview questions and resume templates for large manufacturers
③Huawei certification question bank (HCIA/HCIP)
④Huawei certification e-books
⑤ensp installation package and tutorials
Insert image description here
Insert image description here

If you need it, you can privately message "Learn" or leave a comment "I want it" in the background and take it away immediately!

Guess you like

Origin blog.csdn.net/zhongyuanjy/article/details/129146413