N - Definitions

  • N

    NACK (NAK, negative acknowledgment, not acknowledged)

    NACK, or NAK, an abbreviation for negative acknowledgment or not acknowledged, is a signal used by computers or other devices to indicate that data transmitted over a network was received with errors or was otherwise unreadable.

  • NBASE-T Ethernet

    NBASE-T Ethernet is an IEEE standard and Ethernet-signaling technology that enables existing twisted-pair copper cabling to exceed the cable's specified limit of 1 gigabit per second (Gbps) for distances of up to 100 meters.

  • NBMA (non-broadcast multiple access)

    Non-broadcast multiple access (NBMA) is one of four network types in the Open Shortest Path First (OSPF) communications protocol.

  • near-end crosstalk (NEXT)

    Near-end crosstalk (NEXT) is an error condition that can occur when connectors are attached to twisted pair cabling.

  • net neutrality

    Net neutrality is the concept of an open, equal internet for everyone, regardless of content consumed or the device, application or platform used.

  • NetBIOS (Network Basic Input/Output System)

    NetBIOS (Network Basic Input/Output System) is a network service that enables applications on different computers to communicate with each other across a local area network (LAN).

  • network access control (NAC)

    Network access control (NAC), also called network admission control, is a method to bolster the security, visibility and access management of a proprietary network.

  • Network Address Translation (NAT)

    A Network Address Translation (NAT) is the process of mapping an internet protocol (IP) address to another by changing the header of IP packets while in transit via a router.

  • network analyzer (protocol analyzer or packet analyzer)

    A network analyzer -- also called a network protocol analyzer or packet analyzer -- is a software application, dedicated appliance or feature set within a network component used in network performance troubleshooting or to enhance protection against malicious activity within a corporate network.

  • Network as a Service (NaaS)

    Network as a service, or NaaS, is a business model for delivering enterprise WAN services virtually on a subscription basis.

  • network assurance

    Network assurance is the method of validating whether services and policies configured on and across network appliances appropriately align with operational goals.

  • Network Configuration Protocol (NETCONF)

    The Network Configuration Protocol (NETCONF) is an Internet Engineering Task Force (IETF) network management protocol that provides a secure mechanism for installing, manipulating and deleting the configuration data on a network device such as a firewall, router or switch.

  • network engineer

    A network engineer is a technology professional who has the necessary skills to plan, implement and oversee the computer networks that support in-house voice, data, video and wireless network services.

  • network fabric

    'Network fabric' is a general term used to describe underlying data network infrastructure as a whole.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have traditionally run on proprietary, dedicated network appliances.

  • network hub

    A network hub is a node that broadcasts data to every computer or Ethernet-based device connected to it.

  • Network layer

    Located at Layer 3 of the Open Systems Interconnection (OSI) communications model, the primary function of the network layer is to move data into and through other networks.

  • network management system

    A network management system, or NMS, is an application or set of applications that lets network engineers manage a network's independent components inside a bigger network management framework and performs several key functions.

  • network operating system (NOS)

    A network operating system (NOS) is a computer operating system (OS) that's designed primarily to support workstations, PCs and, in some instances, older terminals that are connected on a local area network (LAN).

  • network operations center (NOC)

    A network operations center (NOC) is a centralized place from which enterprise information technology (IT) administrators -- either internal or third party -- supervise, monitor and maintain a telecommunications network.

  • network orchestration

    Network orchestration is the use of a software-defined network controller that facilitates the creation of network and network security services to achieve business goals.

  • network performance monitoring (NPM)

    Network performance monitoring (NPM) is the process of measuring and monitoring the quality of service of a network.

  • network protocol

    A network protocol is a set of established rules that specify how to format, send and receive data so that computer network endpoints, including computers, servers, routers and virtual machines, can communicate despite differences in their underlying infrastructures, designs or standards.

  • network security

    Network security encompasses all the steps taken to protect the integrity of a computer network and the data within it.

  • network segmentation

    Network segmentation is a networking architectural design that divides a network into multiple segments (subnets) with each functioning as a smaller, individual network.

  • network service provider (NSP)

    A network service provider (NSP) is a company that owns, operates and sells access to internet backbone infrastructure and services.

  • network switch

    A network switch connects devices in a network to each other, enabling them to talk by exchanging data packets. Switches can be hardware devices that manage physical networks or software-based virtual devices.

  • Network Time Protocol (NTP)

    Network Time Protocol (NTP) is an internet protocol used to synchronize with computer clock time sources in a network.

  • networking (computer)

    Networking, also known as computer networking, is the practice of transporting and exchanging data between nodes over a shared medium in an information system.

  • Next Hop Resolution Protocol (NHRP)

    Next Hop Resolution Protocol (NHRP) is an automated configuration technology that routes data on a distributed network by discovering the best routing path between endpoints.

  • NFVi (network functions virtualization infrastructure)

    NFVi (network functions virtualization infrastructure) encompasses all of the networking hardware and software needed to support and connect virtual network functions in carrier networks.

  • NIS (Network Information System)

    NIS (Network Information System) is a network naming and administration system for smaller networks that was developed by Sun Microsystems.

  • nslookup

    Nslookup is the name of a program that lets users enter a host name and find out the corresponding IP address or domain name system (DNS) record.

  • NVGRE (Network Virtualization using Generic Routing Encapsulation)

    NVGRE (Network Virtualization using Generic Routing Encapsulation) is a network virtualization method that uses encapsulation to create large numbers of virtual LANs (VLANs) for subnets that can extend across dispersed data centers and Layers 2 and 3.

  • What is a network interface card (NIC)?

    A network interface card (NIC) is a hardware component, typically a circuit board or chip, installed on a computer so it can connect to a network.

  • What is a network node?

    A network node is a connection point in a communications network.

  • What is a network packet?

    A network packet is a basic unit of data that is transferred over a computer network, typically a packet-switched network, such as the internet.

  • What is NetOps? Everything you need to know

    NetOps, also referred to as NetOps 2.0 and NetDevOps, is an approach to networking operations that uses DevOps tools and techniques to make network changes more efficiently and effectively than in the past.

  • What is network analytics?

    Network analytics is the application of big data principles and tools to the data used to manage and secure data networks.

  • What is network automation?

    Network automation is a process that uses intelligent software to automate the management, configuration, deployment, testing and operation of both physical and virtual devices.

  • What is network availability?

    Network availability is how long a network system is in uptime over a specific time interval.

  • What is network configuration management (NCM)?

    Network configuration management (NCM) is the process of organizing and maintaining information about all the components in a computer network.

  • What is network management?

    Network management is a multifaceted discipline that provides network administrators with the tools, protocols and processes to maintain and optimize network operations.

  • What is network monitoring?

    Network monitoring, also frequently called network management, is the practice of consistently overseeing a computer network for any failures or deficiencies to ensure continued network performance.

  • What is network scanning? How to, types and best practices

    Network scanning is a procedure for identifying active devices on a network by employing a feature or features in the network protocol to signal to devices and await a response.

  • What is network topology?

    A network topology is the physical and logical arrangement of nodes and connections in a network.

  • What is network traffic?

    Network traffic is the amount of data that moves across a network during any given time.

  • What is network virtualization? Everything you need to know

    Network virtualization is a method of combining the available resources in a network to consolidate multiple physical networks, divide a network into segments or create software networks between VMs.

  • What is network visibility?

    Network visibility is an awareness of the components and data within an enterprise computer network.

  • What is NFV MANO (network functions virtualization management and orchestration)?

    NFV MANO (network functions virtualization management and orchestration), or just MANO, is an architectural framework used to manage and orchestrate virtual network functions (VNFs) and other software components.

  • What is the Nessus vulnerability scanning platform?

    Nessus is a platform developed by Tenable that scans for security vulnerabilities in devices, applications, operating systems, cloud services and other network resources.