Networking Definitions

This glossary explains the meaning of key words and phrases that information technology (IT) and business professionals use when discussing networking and related software products. You can find additional definitions by visiting WhatIs.com or using the search box below.

Search Definitions
  • E

    Enhanced Interior Gateway Routing Protocol (EIGRP)

    Enhanced Interior Gateway Routing Protocol (EIGRP) is a network protocol that enables routers to exchange information more efficiently than earlier network protocols, such as Interior Gateway Routing Protocol (IGRP) or Border Gateway Protocol (BGP).

  • Ethernet

    Ethernet is the traditional technology for connecting devices in a wired local area network (LAN) or wide area network (WAN).

  • Evolved Packet Core (EPC)

    Evolved Packet Core (EPC) is a flat architecture that provides a converged voice and data networking framework to connect users on a Long-Term Evolutio (LTE) network.

  • extranet

    An extranet is a private network that enterprises use to provide trusted third parties -- such as suppliers, vendors, partners, customers and other businesses -- secure, controlled access to business information or operations.

  • F

    fault management

    Fault management is the component of network management concerned with detecting, isolating and resolving problems.

  • fax

    A fax (short for facsimile and sometimes called telecopying) is the telephonic transmission of scanned-in printed material (text or images), usually to a telephone number associated with a printer or other output device.

  • FCAPS (fault, configuration, accounting, performance and security)

    FCAPS (fault, configuration, accounting, performance and security) is a network management framework created by the International Organization for Standardization (ISO).

  • FDDI (Fiber Distributed Data Interface)

    FDDI (Fiber Distributed Data Interface) is a network standard that uses fiber optic connections in a local area network (LAN) that can extend in range up to 200 kilometers (124 miles).

  • fiber optics (optical fiber)

    Fiber optics, or optical fiber, refers to the technology that transmits information as light pulses along a glass or plastic fiber.

  • fiber to the home (FTTH)

    Fiber to the home (FTTH), also called fiber to the premises (FTTP), is the installation and use of optical fiber from a central point directly to individual buildings such as residences, apartment buildings and businesses to provide high-speed internet access.

  • fiber to the x (FTTx)

    Fiber to the x (FTTx) is a collective term for various optical fiber delivery topologies that are categorized according to where the fiber terminates

  • file server

    A file server is a computer responsible for the storage and management of data files so that other computers on the same network can access the files.

  • File Transfer Access and Management (FTAM)

    File Transfer Access and Management (FTAM) is an OSI application Layer 7 protocol that standardizes how files are accessed and managed in a distributed network file system.

  • firewall as a service (FWaaS)

    Firewall as a service (FWaaS), also known as a cloud firewall, is a service that provides cloud-based network traffic inspection capabilities to customers seeking to decommission or augment their existing network firewall appliances.

  • fixed-length subnet mask (FLSM)

    A fixed-length subnet mask (FLSM) refers to a type of enterprise or provider networking where a block of IP addresses is divided into multiple subnets of equal length (i.e., an equal number of IP addresses).

  • flooding (network)

    In a computer network, flooding occurs when a router uses a non-adaptive routing algorithm to send an incoming packet to every outgoing link except the node on which the packet arrived.

  • flow routing

    Flow routing is a network routing technology that takes variations in the flow of data into account to increase routing efficiency.

  • frame relay

    Frame relay is a packet-switching telecommunications service designed for cost-efficient data transmission for intermittent traffic between local area networks (LANs) and between endpoints in wide area networks (WANs).

  • frequency-division multiplexing (FDM)

    In frequency-division multiplexing (FDM), multiple signals are combined for transmission on a single communications line or channel, with each signal assigned to a different frequency (subchannel) within the main channel.

  • frequency-hopping spread spectrum (FHSS)

    Frequency-hopping spread spectrum (FHSS) transmission is the repeated switching of the carrier frequency during radio transmission to reduce interference and avoid interception.

  • frequency-shift keying (FSK)

    Frequency-shift keying (FSK) is a method of transmitting digital signals using discrete signals.

  • FTP (File Transfer Protocol)

    FTP (File Transfer Protocol) is a network protocol for transmitting files between computers over TCP/IP connections.

  • full-duplex

    Full-duplex data transmission means that data can be transmitted in both directions on a signal carrier at the same time.

  • G

    Generic Routing Encapsulation (GRE)

    Generic Routing Encapsulation (GRE) is a simple protocol that encapsulates packets in order to route other protocols over IP networks, as defined by RFC 2784.

  • gigabit

    In data communications, a gigabit is one billion bits, or 1,000,000,000 (that is, 10^9) bits. It's commonly used for measuring the amount of data that is transferred in a second between two telecommunication points.

  • Gigabit Ethernet (GbE)

    Gigabit Ethernet (GbE), a transmission technology based on the Ethernet frame format and protocol used in local area networks (LANs), provides a data rate of 1 billion bits per second, or 1 gigabit (Gb).

  • GMPLS (Generalized Multiprotocol Label Switching or Multiprotocol Lambda Switching)

    GMPLS (Generalized Multiprotocol Label Switching) is a networking technology that enables fast and reliable network switching of data flows on any type of network infrastructure.

  • graceful degradation

    Graceful degradation is the ability of a computer, machine, electronic system or network to maintain limited functionality even when a large portion of it has been destroyed or rendered inoperative. The purpose of graceful degradation is to prevent catastrophic failure... (Continued)

  • green networking

    Green networking is the practice of selecting energy-efficient networking technologies and products and minimizing resource use whenever possible.

  • GVRP (GARP VLAN Registration Protocol or Generic VLAN Registration Protocol)

    GVRP (GARP VLAN Registration Protocol or Generic VLAN Registration Protocol) is a standards-based protocol that facilitates control of virtual local area networks (VLANs) within a larger network.

  • H

    HAProxy

    HAProxy (High Availability Proxy), developed by HAProxy Technologies LLC, is an open source load balancer proxy for TCP and HTTP applications.

  • HDLC (High-level Data Link Control)

    HDLC (High-level Data Link Control) is a group of protocols or rules for transmitting data between network points (sometimes called nodes).

  • HELLO packet

    A HELLO packet is a special data packet (message) that is sent out periodically from a router to establish and confirm network adjacency relationships to other routers in the Open Shortest Path First (OSPF) communications protocol.

  • home server

    A home server is a computer that functions as a server in a client-server home network.

  • host (in computing)

    A host (also known as "network host") is a computer or other device that communicates with other hosts on a network.

  • I

    ICMP (Internet Control Message Protocol)

    ICMP (Internet Control Message Protocol) is an error-reporting protocol that network devices such as routers use to generate error messages to the source IP address when network problems prevent delivery of IP packets.

  • IDSL

    IDSL is a hybrid of a digital subscriber line (DSL) and integrated services digital network (ISDN) technology that transmits data slightly faster than ISDN but much slower than most DSL services.

  • IEEE 802 wireless standards

    The IEEE 802 standard is a collection of networking standards that cover the physical and data-link layer specifications for technologies such as Ethernet and wireless.

  • IEEE 802.3

    802.3, or IEEE 802.3, is a working group of standard specifications for Ethernet, a method of packet-based physical communication in a local area network maintained by the Institute of Electrical and Electronics Engineers.

  • infrared radiation (IR)

    Infrared radiation (IR), sometimes referred to simply as infrared, is a region of the electromagnetic radiation spectrum where wavelengths range from about 700 nanometers (nm) to 1 millimeter (mm).

  • ingress filtering

    Ingress filtering is a method used by enterprises and internet service providers (ISPs) to prevent suspicious traffic from entering a network.

  • international private leased circuit (IPLC)

    An international private leased circuit (IPLC) is a point-to-point private line used by an organization to communicate between offices that are dispersed throughout the world.

  • internet metering

    Internet metering is a service model in which an internet service provider (ISP) keeps track of bandwidth use and charges users accordingly.

  • IPTV (Internet Protocol television)

    IPTV (Internet Protocol television) is a service that provides television programming and other video content using the Transmission Control Protocol/Internet Protocol (TCP/IP) suite, as opposed to broadcast TV, cable TV or satellite signals.

  • IPv6 (Internet Protocol Version 6)

    IPv6 is a set of specifications from the Internet Engineering Task Force that improves IPv4 by extending IP addresses from 32 bits to 128 bits.

  • J

    Joint Academic Network (JANET)

    The Joint Academic Network (JANET) is an internal, high-speed computer network that links the U.K. education and research community.

  • jumbo frames

    A jumbo frame is an Ethernet frame with a payload greater than the standard maximum transmission unit (MTU) of 1,500 bytes. 

  • K

    Kbps (kilobits per second)

    In the U.S., Kbps stands for kilobits per second (thousands of bits per second) and is a measure of bandwidth (the amount of data that can flow in a given time) on a data transmission medium.

  • keystone jack

    A keystone jack is a female connector used in data communications, particularly local area networks (LANs).

  • L

    Layer Two Tunneling Protocol (L2TP)

    Layer Two Tunneling Protocol (L2TP) is an extension of the Point-to-Point Tunneling Protocol (PPTP) used by an internet service provider (ISP) to enable the operation of a virtual private network (VPN) over the internet.

  • Link Control Protocol (LCP)

    In computer networking, Point-to-Point Protocol (PPP) provides a standard way to transport multiprotocol data over point-to-point links; within PPP, Link Control Protocol (LCP) establishes, configures and tests data link internet connections.

  • load balancing

    Load balancing is a technique used to distribute network traffic across a pool of servers known as a server farm.

  • local area network (LAN)

    A local area network (LAN) is a group of computers and peripheral devices that share a common communications line or wireless link to a server within a distinct geographic area.

  • location-based service (LBS)

    A location-based service (LBS) is a software service for mobile device applications that requires knowledge about where the mobile device is geographically located.

  • logical network

    A logical network is one that appears to the user as a single, separate entity although it might in fact be either just a part of a larger network or an entity connecting multiple networks. A logical network is defined by its IP addressing scheme.

  • loose coupling

    Loose coupling is a method of interconnecting the components in a system or network so that those components, also called elements, depend on each other to the least extent practicable... (Continued)

  • M

    MAC address (media access control address)

    A MAC address (media access control address) is a 12-digit hexadecimal number assigned to each device connected to the network.

  • managed network services

    Managed network services are networking applications, functions and services that enterprises outsource to be remotely operated, monitored and maintained by a managed service provider (MSP).

  • Manchester encoding

    In data transmission, Manchester encoding is a form of digital encoding in which data bits are represented by transitions from one logical state to the other.

  • maximum segment size (MSS)

    The maximum segment size (MSS) is the largest amount of data, specified in bytes, that a computer or communications device can handle in a single, unfragmented piece.

  • maximum transmission unit (MTU)

    The maximum transmission unit (MTU) is the largest size frame or packet -- in bytes or octets (eight-bit bytes) -- that can be transmitted across a data link.

  • MDI/MDIX (medium-dependent interface/MDI crossover)

    MDI/MDIX is a type of Ethernet port connection that uses twisted-pair cabling to link two networked devices.

  • megabits per second (Mbps)

    Megabits per second (Mbps) are units of measurement for network bandwidth and throughput. It is used to show how fast a network or internet connection is.

  • megahertz (MHz)

    The megahertz, abbreviated MHz, is a unit of alternating current (AC) or electromagnetic (EM) wave frequency equal to one million hertz (1,000,000 Hz).

  • metropolitan area network (MAN)

    A metropolitan area network (MAN) is a computer network that is larger than a single building local area network (LAN) but is located in a single geographic area that is smaller than a wide area network (WAN).

  • microsegmentation

    Microsegmentation is a security technique that splits a network into definable zones and uses policies to dictate how data and applications within those zones can be accessed and controlled.

  • Microsoft Network Access Protection (NAP)

    Network access protection (NAP), introduced with Windows Server 2008, is Microsoft’s approach to controlling access to a network based on a determination of each device’s health.

  • millimeter wave (MM wave)

    Millimeter wave (MM wave), also known as millimeter band, is the band of spectrum with wavelengths between 10 millimeters (30 GHz) and 1 millimeter (300 GHz).

  • modulation

    Modulation is the process of converting data into radio waves by adding information to an electronic or optical carrier signal.

  • multi-user MIMO

    Multi-user MIMO (MU-MIMO) is a wireless communication technology that uses multiple antennas to improve communication by creating multiple connections to the same device at the same time

  • multiplexing

    Multiplexing, or muxing, is a way of sending multiple signals or streams of information over a communications link at the same time in the form of a single, complex signal.

  • Multiprotocol Label Switching (MPLS)

    Multiprotocol Label Switching (MPLS) is a protocol-agnostic routing technique designed to speed up and shape traffic flows across enterprise wide area and service provider networks.

  • mutex (mutual exclusion object)

    In computer programming, a mutex (mutual exclusion object) is a program object that is created so that multiple program thread can take turns sharing the same resource, such as access to a file.

  • N

    NACK (NAK, negative acknowledgment, not acknowledged)

    NACK, or NAK, an abbreviation for negative acknowledgment or not acknowledged, is a signal used by computers or other devices to indicate that data transmitted over a network was received with errors or was otherwise unreadable.

  • NBASE-T Ethernet

    NBASE-T Ethernet is an IEEE standard and Ethernet-signaling technology that allows existing twisted-pair copper cabling to exceed the cable's specified limit of 1 Gbps for distances of up to 100 meters.

  • NBMA (non-broadcast multiple access)

    Non-broadcast multiple access (NBMA) is one of four network types in the Open Shortest Path First (OSPF) communications protocol.

  • near-end crosstalk (NEXT)

    Near-end crosstalk (NEXT) is an error condition that can occur when connectors are attached to twisted pair cabling.

  • Nessus

    Nessus is an open-source network vulnerability scanner that uses the Common Vulnerabilities and Exposures architecture for easy cross-linking between compliant security tools.

  • net neutrality

    Net neutrality is the concept of an open, equal internet for everyone, regardless of content consumed or the device, application or platform used.

  • NetBIOS (Network Basic Input/Output System)

    NetBIOS (Network Basic Input/Output System) is a network service that enables applications on different computers to communicate with each other across a local area network (LAN).

  • NETCONF

    NETCONF is an IETF network management protocol that provides an administrator or network engineer with a secure way to configure a firewall, router, switch or other network device.

  • network access control (NAC)

    Network access control (NAC), also called network admission control, is a method to bolster the security, visibility and access management of a proprietary network.

  • Network Address Translation (NAT)

    A Network Address Translation (NAT) is the process of mapping an internet protocol (IP) address to another by changing the header of IP packets while in transit via a router.

  • network analytics

    Network analytics is the application of big data principles and tools to the data used to manage and secure data networks.

  • network analyzer (protocol analyzer or packet analyzer)

    A network analyzer -- also called a network protocol analyzer or packet analyzer -- is a software application, dedicated appliance or feature set within a network component used in network performance troubleshooting or to enhance protection against malicious activity within a corporate network.

  • Network as a Service (NaaS)

    Network as a service, or NaaS, is a business model for delivering enterprise WAN services virtually on a subscription basis.

  • network automation

    Network automation is a methodology in which software automatically configures, provisions, manages and tests network devices.

  • network configuration management (NCM)

    Network configuration management is the process of organizing and maintaining information about all of the components in a computer network.

  • network downtime

    Network downtime refers to inaccessibility to part or all of a network due to the failure of hardware, software or some combination of the two.

  • network engineer

    A network engineer is a technology professional who has the necessary skills to plan, implement and oversee the computer networks that support in-house voice, data, video and wireless network services.

  • network fabric

    Network fabric is an industry term that describes a network topology in which devices pass data to each other through interconnecting switches.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have traditionally run on proprietary, dedicated network appliances.

  • network hub

    A network hub is a node that broadcasts data to every computer or Ethernet-based device connected to it.

  • network interface card (NIC)

    A network interface card (NIC) is a hardware component, typically a circuit board or chip, which is installed on a computer so it can connect to a network.

  • Network layer

    Located at Layer 3 of the Open Systems Interconnection (OSI) communications model, the primary function of the network layer is to move data into and through other networks.

  • network management

    A cornerstone of all computing is the ability to connect one machine, system or device to another -- enabling what is known as a computer network.

  • network management system

    A network management system (NMS) is an application or set of applications that lets network engineers manage a network's independent components inside a bigger network management framework and performs several key functions.

  • network monitoring

    Network monitoring, also frequently called network management, is the practice of consistently overseeing a computer network for any failures or deficiencies to ensure continued network performance.

  • network node

    A computer network is a system of computers and computing devices that are connected via communication links.

  • network operating system (NOS)

    A network operating system (NOS) is a computer operating system (OS) that is designed primarily to support workstations, personal computers and, in some instances, older terminals that are connected on a local area network (LAN).

Unified Communications
Mobile Computing
Data Center
ITChannel
Close