Networking Definitions

This glossary explains the meaning of key words and phrases that information technology (IT) and business professionals use when discussing networking and related software products. You can find additional definitions by visiting WhatIs.com or using the search box below.

  • E

    extranet

    An extranet is a private network that enterprises use to provide trusted third parties -- such as suppliers, vendors, partners, customers and other businesses -- secure, controlled access to business information or operations.

  • F

    fault management

    Fault management is the component of network management that detects, isolates and fixes problems.

  • fax

    A fax -- short for 'facsimile' and sometimes called 'telecopying' -- is the telephonic transmission of scanned-in printed material, including text or images.

  • FCAPS (fault, configuration, accounting, performance and security)

    FCAPS (fault, configuration, accounting, performance and security) is a network management framework created by the International Organization for Standardization (ISO).

  • FDDI (Fiber Distributed Data Interface)

    FDDI (Fiber Distributed Data Interface) is a network standard that uses fiber optic connections in a local area network (LAN) that can extend in range up to 200 kilometers (124 miles).

  • fiber optics (optical fiber)

    Fiber optics, or optical fiber, refers to the technology that transmits information as light pulses along a glass or plastic fiber.

  • fiber to the home (FTTH)

    Fiber to the home (FTTH), also called fiber to the premises (FTTP), is the installation and use of optical fiber from a central point to individual buildings to provide high-speed internet access.

  • fiber to the x (FTTx)

    Fiber to the x (FTTx) is a collective term for various optical fiber delivery topologies that are categorized according to where the fiber terminates

  • file server

    A file server is a computer responsible for the storage and management of data files so that other computers on the same network can access the files.

  • File Transfer Access and Management (FTAM)

    File Transfer Access and Management (FTAM) is an OSI application Layer 7 protocol that standardizes how files are accessed and managed in a distributed network file system.

  • firewall as a service (FWaaS)

    Firewall as a service (FWaaS), also known as a cloud firewall, is a service that provides cloud-based network traffic analysis capabilities to customers as part of an overall cybersecurity program.

  • fixed-length subnet mask (FLSM)

    A fixed-length subnet mask (FLSM) refers to a type of enterprise or provider networking where a block of IP addresses is divided into multiple subnets of equal length (i.e., an equal number of IP addresses).

  • flooding (network)

    In a computer network, flooding occurs when a router uses a non-adaptive routing algorithm to send an incoming packet to every outgoing link except the node on which the packet arrived.

  • flow routing

    Flow routing is a network routing technology that takes variations in the flow of data into account to increase routing efficiency.

  • frame relay

    Frame relay is a packet-switching telecommunications service designed for cost-efficient data transmission for intermittent traffic between local area networks (LANs) and between endpoints in wide area networks (WANs).

  • frequency band

    In telecommunications, a frequency band -- sometimes called a band -- refers to a specific range of frequencies in the electromagnetic frequency spectrum assigned to certain applications.

  • frequency-division multiplexing (FDM)

    In frequency-division multiplexing (FDM), multiple signals are combined for transmission on a single communications line or channel, with each signal assigned to a different frequency (subchannel) within the main channel.

  • frequency-hopping spread spectrum (FHSS)

    Frequency-hopping spread spectrum (FHSS) transmission is the repeated switching of the carrier frequency during radio transmission to reduce interference and avoid interception.

  • frequency-shift keying (FSK)

    Frequency-shift keying (FSK) is a method of transmitting digital signals using discrete signals.

  • FTP (File Transfer Protocol)

    FTP (File Transfer Protocol) is a network protocol for transmitting files between computers over TCP/IP connections.

  • full-duplex

    Full-duplex data transmission means that data can be transmitted in both directions on a signal carrier at the same time.

  • G

    Generic Routing Encapsulation (GRE)

    Generic Routing Encapsulation (GRE) is a protocol that encapsulates packets in order to route various protocols over Internet Protocol (IP) networks.

  • geo-blocking

    Geo-blocking is blocking something based on its location.

  • gigabit (Gb)

    In data communications, a gigabit (Gb) is 1 billion bits, or 1,000,000,000 (that is, 10^9) bits. It's commonly used for measuring the amount of data that is transferred in a second between two telecommunication points.

  • Gigabit Ethernet (GbE)

    Gigabit Ethernet (GbE), a transmission technology based on the Ethernet frame format and protocol used in local area networks (LANs), provides a data rate of 1 billion bits per second, or 1 gigabit (Gb).

  • GMPLS (Generalized Multiprotocol Label Switching or Multiprotocol Lambda Switching)

    GMPLS (Generalized Multiprotocol Label Switching) is a networking technology that enables fast and reliable network switching of data flows on any type of network infrastructure.

  • graceful degradation

    Graceful degradation is the ability of a computer, machine, electronic system or network to maintain limited functionality even when a large portion of it has been destroyed or rendered inoperative.

  • green networking

    Green networking is the practice of selecting energy-efficient networking technologies and products and minimizing resource use whenever possible.

  • GVRP (GARP VLAN Registration Protocol or Generic VLAN Registration Protocol)

    GVRP (GARP VLAN Registration Protocol or Generic VLAN Registration Protocol) is a standards-based protocol that facilitates control of virtual local area networks (VLANs) within a larger network.

  • H

    HAProxy

    HAProxy is a high-performance, open source load balancer and reverse proxy for TCP and HTTP applications.

  • HDLC (High-level Data Link Control)

    HDLC (High-level Data Link Control) is a group of protocols or rules for transmitting data between network points (sometimes called nodes).

  • HELLO packet

    A HELLO packet is a special data packet (message) that is sent out periodically from a router to establish and confirm network adjacency relationships to other routers in the Open Shortest Path First (OSPF) communications protocol.

  • home server

    A home server is a computer that functions as a server in a client-server home network.

  • host (in computing)

    A host is a computer or other device that communicates with other hosts on a network.

  • I

    ICMP (Internet Control Message Protocol)

    ICMP (Internet Control Message Protocol) is an error-reporting protocol that network devices such as routers use to generate error messages to the source IP address when network problems prevent delivery of IP packets.

  • IDSL

    IDSL is a hybrid of a digital subscriber line (DSL) and integrated services digital network (ISDN) technology that transmits data slightly faster than ISDN but much slower than most DSL services.

  • IEEE 802 wireless standards

    IEEE 802 is a collection of networking standards that cover the physical and data link layer specifications for technologies such as Ethernet and wireless.

  • IEEE 802.3

    802.3, or IEEE 802.3, is a working group of standard specifications for Ethernet, a method of packet-based physical communication in a local area network maintained by the Institute of Electrical and Electronics Engineers.

  • infrared radiation (IR)

    Infrared radiation (IR), sometimes referred to simply as infrared, is a region of the electromagnetic radiation spectrum where wavelengths range from about 700 nm to 1 mm.

  • ingress filtering

    Ingress filtering is a method used by enterprises and internet service providers to prevent suspicious traffic from entering a network.

  • international private leased circuit (IPLC)

    An international private leased circuit (IPLC) is a point-to-point private line used by an organization to communicate between offices that are dispersed throughout the world.

  • internet metering

    Internet metering is a service model in which an internet service provider (ISP) keeps track of bandwidth use and charges users accordingly.

  • IPTV (Internet Protocol television)

    IPTV (Internet Protocol television) is a service that provides television programming and other video content using the Transmission Control Protocol/Internet Protocol (TCP/IP) suite, as opposed to broadcast TV, cable TV or satellite signals.

  • IPv6 (Internet Protocol Version 6)

    IPv6 is a set of specifications from the Internet Engineering Task Force that improves IPv4 by extending IP addresses from 32 bits to 128 bits.

  • J

    Joint Academic Network (JANET)

    The Joint Academic Network (JANET) is an internal, high-speed computer network that links the U.K. education and research community.

  • jumbo frames

    A jumbo frame is an Ethernet frame, or data packet, with a payload greater than the standard size of 1,500 bytes.

  • K

    Kbps (kilobits per second)

    In the U.S., Kbps stands for kilobits per second (thousands of bits per second) and is a measure of bandwidth (the amount of data that can flow in a given time) on a data transmission medium.

  • keystone jack

    A keystone jack is a female connector used in audio, video and data communications. It serves as a receptacle for a matching plug, which is a male connector of the same type as the jack.

  • L

    Layer Two Tunneling Protocol (L2TP)

    Layer Two Tunneling Protocol (L2TP) is an extension of the Point-to-Point Tunneling Protocol (PPTP) used by an internet service provider (ISP) to enable the operation of a virtual private network (VPN) over the internet.

  • Link Control Protocol (LCP)

    In computer networking, Point-to-Point Protocol (PPP) provides a standard way to transport multiprotocol data over point-to-point links; within PPP, Link Control Protocol (LCP) establishes, configures and tests data link internet connections.

  • load balancing

    Load balancing is a technique used to distribute network traffic across a pool of servers known as a server farm.

  • local area network (LAN)

    A local area network (LAN) is a group of computers and peripheral devices that share a common communications line or wireless link to a server within a distinct geographic area.

  • location-based service (LBS)

    A location-based service (LBS) is a software service for mobile device applications that requires knowledge about where the mobile device is geographically located.

  • logical network

    A logical network is a software-defined network topology or routing that is often different than the physical network.

  • loose coupling

    Loose coupling is an approach to interconnecting the components in a system, network or software application so that those components, also called elements, depend on each other to the least extent practicable.

  • M

    MAC address (media access control address)

    A MAC address (media access control address) is a 12-digit hexadecimal number assigned to each device connected to the network.

  • managed network services

    Managed network services are networking applications, functions and services that enterprises outsource to be remotely operated, monitored and maintained by a managed service provider (MSP).

  • Manchester encoding

    In data transmission, Manchester encoding is a form of digital encoding in which a data bit's state -- 0 or 1 -- is represented by the transition from one voltage level to another.

  • maximum segment size (MSS)

    The maximum segment size (MSS) is the largest amount of data, specified in bytes, that a computer or communications device can handle in a single, unfragmented piece.

  • maximum transmission unit (MTU)

    The maximum transmission unit (MTU) is the largest size frame or packet -- in bytes or octets (eight-bit bytes) -- that can be transmitted across a data link.

  • MDI/MDIX (medium-dependent interface/MDI crossover)

    MDI/MDIX is a type of Ethernet port connection that uses twisted-pair cabling to link two networked devices.

  • mean time to innocence

    Mean time to innocence is the average elapsed time between when a system problem is detected and any given team's ability to say the team or part of its system is not the root cause of the problem.

  • megabits per second (Mbps)

    Megabits per second (Mbps) are units of measurement for network bandwidth and throughput. It is used to show how fast a network or internet connection is.

  • megahertz (MHz)

    Megahertz (MHz) is a unit multiplier that represents one million hertz (106 Hz). Hertz is the standard unit of frequency in the International System of Units (SI).

  • metropolitan area network (MAN)

    A metropolitan area network (MAN) is a computer network that is larger than a single building local area network (LAN) but is located in a single geographic area that is smaller than a wide area network (WAN).

  • microsegmentation

    Microsegmentation is a security technique that splits a network into definable zones and uses policies to dictate how data and applications within those zones can be accessed and controlled.

  • millimeter wave (mmWave)

    Millimeter wave (mmWave), also known as millimeter band, is a range of electromagnetic frequencies between microwaves and infrared.

  • modulation

    Modulation is the process of converting data into radio waves by adding information to an electronic or optical carrier signal.

  • multi-user MIMO

    Multi-user MIMO, or MU-MIMO, is a wireless communication technology that uses multiple antennas to improve communication by creating multiple connections to the same device at the same time.

  • multiplexing

    Multiplexing, or muxing, is a way of sending multiple signals or streams of information over a communications link at the same time in the form of a single, complex signal.

  • Multiprotocol Label Switching (MPLS)

    Multiprotocol Label Switching (MPLS) is a switching mechanism used in wide area networks (WANs).

  • mutual exclusion (mutex)

    In computer programming, a mutual exclusion (mutex) is a program object that prevents multiple threads from accessing the same shared resource simultaneously.

  • N

    NACK (NAK, negative acknowledgment, not acknowledged)

    NACK, or NAK, an abbreviation for negative acknowledgment or not acknowledged, is a signal used by computers or other devices to indicate that data transmitted over a network was received with errors or was otherwise unreadable.

  • NBASE-T Ethernet

    NBASE-T Ethernet is an IEEE standard and Ethernet-signaling technology that allows existing twisted-pair copper cabling to exceed the cable's specified limit of 1 Gbps for distances of up to 100 meters.

  • NBMA (non-broadcast multiple access)

    Non-broadcast multiple access (NBMA) is one of four network types in the Open Shortest Path First (OSPF) communications protocol.

  • near-end crosstalk (NEXT)

    Near-end crosstalk (NEXT) is an error condition that can occur when connectors are attached to twisted pair cabling.

  • Nessus

    Nessus is a platform developed by Tenable that scans for security vulnerabilities in devices, applications, operating systems, cloud services and other network resources.

  • net neutrality

    Net neutrality is the concept of an open, equal internet for everyone, regardless of content consumed or the device, application or platform used.

  • NetBIOS (Network Basic Input/Output System)

    NetBIOS (Network Basic Input/Output System) is a network service that enables applications on different computers to communicate with each other across a local area network (LAN).

  • network access control (NAC)

    Network access control (NAC), also called network admission control, is a method to bolster the security, visibility and access management of a proprietary network.

  • Network Address Translation (NAT)

    A Network Address Translation (NAT) is the process of mapping an internet protocol (IP) address to another by changing the header of IP packets while in transit via a router.

  • network analytics

    Network analytics is the application of big data principles and tools to the data used to manage and secure data networks.

  • network analyzer (protocol analyzer or packet analyzer)

    A network analyzer -- also called a network protocol analyzer or packet analyzer -- is a software application, dedicated appliance or feature set within a network component used in network performance troubleshooting or to enhance protection against malicious activity within a corporate network.

  • Network as a Service (NaaS)

    Network as a service, or NaaS, is a business model for delivering enterprise WAN services virtually on a subscription basis.

  • network assurance

    Network assurance is the method of validating whether services and policies configured on and across network appliances appropriately align with operational goals.

  • network automation

    Network automation is a methodology in which software automatically configures, provisions, manages and tests network devices.

  • network configuration management (NCM)

    Network configuration management is the process of organizing and maintaining information about all of the components in a computer network.

  • Network Configuration Protocol (NETCONF)

    The Network Configuration Protocol (NETCONF) is an Internet Engineering Task Force (IETF) network management protocol that provides a secure mechanism for installing, manipulating and deleting the configuration data on a network device such as a firewall, router or switch.

  • network downtime

    Network downtime refers to inaccessibility to part or all of a network due to the failure of hardware, software or some combination of the two.

  • network engineer

    A network engineer is a technology professional who has the necessary skills to plan, implement and oversee the computer networks that support in-house voice, data, video and wireless network services.

  • network fabric

    'Network fabric' is a general term used to describe underlying data network infrastructure as a whole.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have traditionally run on proprietary, dedicated network appliances.

  • network hub

    A network hub is a node that broadcasts data to every computer or Ethernet-based device connected to it.

  • network interface card (NIC)

    A network interface card (NIC) is a hardware component, typically a circuit board or chip, installed on a computer so it can connect to a network.

  • Network layer

    Located at Layer 3 of the Open Systems Interconnection (OSI) communications model, the primary function of the network layer is to move data into and through other networks.

  • network management

    A cornerstone of all computing is the ability to connect one machine, system or device to another -- enabling what is known as a computer network.

  • network management system

    A network management system, or NMS, is an application or set of applications that lets network engineers manage a network's independent components inside a bigger network management framework and performs several key functions.

  • network monitoring

    Network monitoring, also frequently called network management, is the practice of consistently overseeing a computer network for any failures or deficiencies to ensure continued network performance.

  • network node

    A computer network is a system of computers and computing devices that are connected via communication links.

  • network operating system (NOS)

    A network operating system (NOS) is a computer operating system (OS) that's designed primarily to support workstations, PCs and, in some instances, older terminals that are connected on a local area network (LAN).

Unified Communications
Mobile Computing
Data Center
ITChannel
Close