Computer networking and system architecture include several technical terms used in hardware, software, and communication systems. This document provides structured definitions for better understanding.
Core Networking & System Terms
| Term | Description |
|---|---|
| PCIe | Peripheral Component Interconnect Express – High-speed hardware interface standard |
| LAN | Local Area Network – Network within a small geographic area |
| IP | Internet Protocol – Used for device addressing and routing |
| DMA | Direct Memory Access – Allows hardware to access memory directly |
| RDMA | Remote Direct Memory Access – Enables direct memory access over network |
| NVMe | Non-Volatile Memory Express – Storage interface protocol |
| MMU | Memory Management Unit – Handles memory mapping |
| UART | Universal Asynchronous Receiver/Transmitter – Serial communication protocol |
| VA | Virtual Address – Logical memory address |
| PA | Physical Address – Actual memory location |
| IPA | Intermediate Physical Address – Used in virtualization |
Advanced Hardware & Networking Terms
| Term | Description |
|---|---|
| SR-IOV | Single Root Input/Output Virtualization – Hardware virtualization technique |
| VF | Virtual Function – Virtual instance of a physical device |
| CPE | Customer Protocol Engine |
| LCE | Lookaside Crypto and Compression Engine |
| ICE | Inline Cryptography Engine |
| CXP | Cryptography Packet Processor |
| FXP | Flexible Packet Processor |
| PB | Packet Builder |
| TS | Traffic Shaper |
| MSS | Memory Subsystem |
| IMC | Integrated Management Complex |
| ATE | Address Translation Engine |
Basic Networking Concepts
- LAN – Local Area Network used for small area connectivity
- WAN – Wide Area Network used for large geographic coverage
- IP Address – Unique identifier assigned to each device
- MAC Address – Hardware address of a network interface
- Router – Device that connects multiple networks
- Switch – Connects devices within the same network
- Firewall – Security system to protect networks
Note: These terms are widely used in computer engineering, networking, cloud computing, and cybersecurity domains. A clear understanding is essential for IT professionals and students.