Management Definitions

  • #

    3GPP (3rd Generation Partnership Project)

    The 3rd Generation Partnership Project (3GPP) is a collaborative project between a group of telecommunications associations with the initial goal of developing globally applicable specifications for third-generation (3G) mobile systems.

  • A

    application delivery controller (ADC)

    An application delivery controller (ADC) is a network component that manages and optimizes how client machines connect to web and enterprise application servers.

  • autonomous system (AS)

    An autonomous system (AS) in networking is a collection of one or more associated Internet Protocol (IP) prefixes with a clearly defined routing policy that governs how the AS exchanges routing information with other autonomous systems.

  • B

    bandwidth (network bandwidth)

    Network bandwidth is a measurement indicating the maximum capacity of a wired or wireless communications link to transmit data over a network connection in a given amount of time.

  • baseboard management controller (BMC)

    A baseboard management controller (BMC) is a specialized service processor that remotely monitors the physical state of a host system, such as a computer, network server or other hardware devices.

  • bit stuffing

    Bit stuffing refers to the insertion of one or more bits into a data transmission as a way to provide signaling information to a receiver.

  • bogon

    A bogon is an illegitimate Internet Protocol address that falls into a set of IP addresses that have not been officially assigned to an entity by an internet registration institute, such as the IANA.

  • C

    CBRS (Citizens Broadband Radio Service)

    Citizens Broadband Radio Service, or CBRS, is the set of operational rules given to a slice of the shared wireless spectrum and the technologies used in that spectrum.

  • CIDR (Classless Inter-Domain Routing or supernetting)

    CIDR (Classless Inter-Domain Routing or supernetting) is a method of assigning IP addresses that improves the efficiency of address distribution and replaces the previous system based on Class A, Class B and Class C networks.

  • Cisco Enterprise Agreement (EA)

    Cisco Enterprise Agreement (EA) is a software buying program that digitizes and simplifies license management for Cisco suite customers.

  • collision in networking

    In a half-duplex Ethernet network, a collision is the result of two devices on the same Ethernet network attempting to transmit data at the same time.

  • computer network

    A computer network is a group of interconnected nodes or computing devices that exchange data and resources with each other.

  • What is Cisco Performance Routing (PfR)?

    Cisco Performance Routing (PfR) is a way of sending network packets based on intelligent path control.

  • D

    data streaming

    Data streaming is the continuous transfer of data from one or more sources at a steady, high speed for processing into specific outputs.

  • deep packet inspection (DPI)

    Deep packet inspection (DPI) is an advanced method of examining and managing network traffic.

  • E

    What is east-west traffic?

    East-west traffic refers to the transfer of data packets that move from server to server within a network's data center.

  • F

    fault management

    Fault management is the component of network management that detects, isolates and fixes problems.

  • What is FCAPS (fault, configuration, accounting, performance and security)?

    FCAPS (fault, configuration, accounting, performance and security) is a network management framework and model created by the International Organization for Standardization (ISO).

  • H

    HAProxy

    HAProxy is a high-performance, open source load balancer and reverse proxy for TCP and HTTP applications.

  • I

    What is ICMP (Internet Control Message Protocol)?

    ICMP (Internet Control Message Protocol) is a network layer error-reporting protocol that's used to communicate data transmission problems.

  • L

    load balancing

    Load balancing is a technique used to distribute network traffic across a pool of servers known as a server farm.

  • M

    mean time to innocence

    Mean time to innocence is the average elapsed time between when a system problem is detected and any given team's ability to say the team or part of its system is not the root cause of the problem.

  • What are managed network services?

    Managed network services are networking applications, functions and services that a managed service provider (MSP) remotely operates, monitors and maintains for an enterprise.

  • N

    network analyzer (protocol analyzer or packet analyzer)

    A network analyzer -- also called a network protocol analyzer or packet analyzer -- is a software application, dedicated appliance or feature set within a network component used in network performance troubleshooting or to enhance protection against malicious activity within a corporate network.

  • Network as a Service (NaaS)

    Network as a service, or NaaS, is a business model for delivering enterprise WAN services virtually on a subscription basis.

  • network assurance

    Network assurance is the method of validating whether services and policies configured on and across network appliances appropriately align with operational goals.

  • network management system

    A network management system, or NMS, is an application or set of applications that lets network engineers manage a network's independent components inside a bigger network management framework and performs several key functions.

  • network operations center (NOC)

    A network operations center (NOC) is a centralized place from which enterprise information technology (IT) administrators -- either internal or third party -- supervise, monitor and maintain a telecommunications network.

  • network orchestration

    Network orchestration is the use of a software-defined network controller that facilitates the creation of network and network security services to achieve business goals.

  • network performance monitoring (NPM)

    Network performance monitoring (NPM) is the process of measuring and monitoring the quality of service of a network.

  • What is NetOps? Everything you need to know

    NetOps, also referred to as NetOps 2.0 and NetDevOps, is an approach to networking operations that uses DevOps tools and techniques to make network changes more efficiently and effectively than in the past.

  • What is network analytics?

    Network analytics is the application of big data principles and tools to the data used to manage and secure data networks.

  • What is network automation?

    Network automation is a process that uses intelligent software to automate the management, configuration, deployment, testing and operation of both physical and virtual devices.

  • What is network availability?

    Network availability is how long a network system is in uptime over a specific time interval.

  • What is network configuration management (NCM)?

    Network configuration management (NCM) is the process of organizing and maintaining information about all the components in a computer network.

  • What is network management?

    Network management is a multifaceted discipline that provides network administrators with the tools, protocols and processes to maintain and optimize network operations.

  • What is network monitoring?

    Network monitoring, also frequently called network management, is the practice of consistently overseeing a computer network for any failures or deficiencies to ensure continued network performance.

  • What is network scanning? How to, types and best practices

    Network scanning is a procedure for identifying active devices on a network by employing a feature or features in the network protocol to signal to devices and await a response.

  • What is network topology?

    A network topology is the physical and logical arrangement of nodes and connections in a network.

  • What is network visibility?

    Network visibility is an awareness of the components and data within an enterprise computer network.

  • What is NFV MANO (network functions virtualization management and orchestration)?

    NFV MANO (network functions virtualization management and orchestration), or just MANO, is an architectural framework used to manage and orchestrate virtual network functions (VNFs) and other software components.

  • O

    operational support system (OSS)

    An operational support system (OSS) is a set of programs that helps a communications service provider monitor, control, analyze and manage a telephone or computer network.

  • What is open networking?

    Open networking describes a network that uses open standards and commodity hardware.

  • P

    What is a programmable network (network programmability)?

    A programmable network is one in which software that operates independently of network hardware handles the behavior of network devices and flow control.

  • What is ping and how does it work?

    Ping (Packet Internet Groper) is a basic internet program that enables a user to test and verify if a particular destination Internet Protocol (IP) address is reachable and can respond to network requests.

  • R

    remote infrastructure management

    Remote infrastructure management, or RIM, is a comprehensive approach to handling and overseeing an organization's IT infrastructure, systems and services from a remote location.

  • runbook

    Runbooks are a set of standardized written procedures for completing repetitive IT processes within a company.

  • S

    What is Simple Network Management Protocol (SNMP)?

    Simple Network Management Protocol (SNMP) is an application-layer protocol for monitoring and managing network devices on a local area network or wide area network.

  • What is streaming network telemetry?

    Streaming network telemetry is a real-time data collection service in which network devices, such as routers, switches and firewalls, continuously push data related to the network's health to a centralized location.

  • T

    time-to-live (TTL)

    Time-to-live (TTL) is a value for the period of time that a packet, or data, should exist on a computer or network before being discarded.

  • Transmission Control Protocol (TCP)

    Transmission Control Protocol (TCP) is a standard protocol on the internet that ensures the reliable transmission of data between devices on a network.

  • What is Telnet?

    Telnet is a network protocol used to remotely access a computer for a text-based communication channel between two machines.

  • What is traffic shaping (packet shaping)?

    Traffic shaping, also known as packet shaping, is a congestion management method that regulates network data transfer by delaying the flow of less important or less desired packets.

  • W

    What is network downtime?

    Network downtime refers to inaccessibility to part or all of a network due to the failure of hardware, software or some combination of both.