Browse Definitions :

Network administration

Terms related to managing computer networks, including definitions about LANS or WANS and words and phrases about network design, troubleshooting, security and backups.

100 - EAV

  • 100 Gigabit Ethernet (100 GbE) - 100 Gigabit Ethernet (100 GbE) is an Ethernet standard that supports data speeds of up to 100 billion bits (gigabits) per second (Gbps).
  • 10BASE-T - 10BASE-T is an Ethernet standard for local area networks and one of several physical media specified in the Institute of Electrical and Electronics Engineers (IEEE) 802.
  • 40 Gigabit Ethernet (40GbE) - 40 Gigabit Ethernet (40GbE) is a standard that enables the transfer of Ethernet frames at speeds of up to 40 gigabits per second (Gbps).
  • AAA server (authentication, authorization and accounting) - An AAA server is a server program that handles user requests for access to computer resources and, for an enterprise, provides authentication, authorization and accounting (AAA) services.
  • acceptable use policy (AUP) - An acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree to for access to a corporate network, the internet or other resources.
  • Amazon Simple Storage Service (Amazon S3) - Amazon Simple Storage Service (Amazon S3) is a scalable, high-speed, web-based cloud storage service.
  • AMD-V (AMD virtualization) - AMD-V (AMD virtualization) is a set of hardware extensions for the X86 processor architecture.
  • analog telephone adapter (ATA) - An analog telephone adaptor (ATA) is a device used to connect a standard telephone to a computer or network so that the user can make calls over the Internet.
  • Apache Kafka - Apache Kafka is a distributed publish-subscribe messaging system that receives data from disparate source systems and makes the data available to target systems in real time.
  • Apple Bonjour - Apple Bonjour is a group of networking technologies designed to help devices and applications discover each other on the same network.
  • application blacklisting - Application blacklisting, sometimes just referred to as blacklisting, is a network administration practice used to prevent the execution of undesirable programs.
  • application delivery controller (ADC) - An application delivery controller (ADC) is a network component that manages and optimizes how client machines connect to web and enterprise application servers.
  • application streaming - Application streaming is an on-demand software delivery model that takes advantage of the fact that most applications require only a small fraction of their total program code to run.
  • application whitelisting - Application whitelisting is the practice of specifying an index of approved software applications or executable files that are permitted to be present and active on a computer system.
  • attack surface - An attack surface is defined as the total number of all possible entry points for unauthorized access into any system.
  • authentication server - An authentication server is an application that facilitates the authentication of an entity that attempts to access a network.
  • authentication, authorization, and accounting (AAA) - Authentication, authorization, and accounting (AAA) is a framework for intelligently controlling access to computer resources, enforcing policies, auditing usage, and providing the information necessary to bill for services.
  • auto attendant (automated attendant) - An automated attendant (AA) is a telephony system that transfers incoming calls to various extensions as specified by callers, without the intervention of a human operator.
  • Automatic Private IP Addressing (APIPA) - Automatic Private IP Addressing (APIPA) is a feature of Windows-based OSes -- included since Windows 98 and Windows ME -- that enables a Dynamic Host Configuration Protocol client to automatically assign an IP address to itself when there's no DHCP server available to perform that function.
  • autonomous system (AS) - An autonomous system (AS) in networking is a collection of one or more associated Internet Protocol (IP) prefixes with a clearly defined routing policy that governs how the AS exchanges routing information with other autonomous systems.
  • AWS CloudWatch - Amazon CloudWatch is a component of Amazon Web Services that provides monitoring for AWS resources and the customer applications running on the Amazon infrastructure.
  • backup domain controller (Windows NT) - A backup domain controller (BDC) is a role a Windows NT computer takes on to help manage access to network resources.
  • bandwidth (network bandwidth) - Network bandwidth is a measurement indicating the maximum capacity of a wired or wireless communications link to transmit data over a network connection in a given amount of time.
  • bare-metal provisioning - Bare-metal provisioning is the process of installing an operating system (OS) or Type 1 hypervisor directly on a computer's hardware.
  • baseboard management controller (BMC) - A baseboard management controller (BMC) is a specialized service processor that monitors the physical state of a computer, network server or other hardware device using sensors and communicating with the system administrator through an independent connection.
  • beamforming - Beamforming is a type of radio frequency (RF) management in which a wireless signal is directed toward a specific receiving device.
  • BIOS rootkit - A BIOS-level rootkit is programming that exists in a system's memory hardware to enable remote administration.
  • blacklist - A blacklist, in IT, is a collection of entities that are blocked from communicating with or logging into a computer, site or network.
  • Blue Cloud - Blue Cloud is an approach to shared infrastructure developed by IBM.
  • BOOTP (Bootstrap Protocol) - BOOTP (Bootstrap Protocol) is an internet protocol that lets a network user automatically be configured to receive an IP address and have an operating system booted without user involvement.
  • built-in administrator account - In the Windows operating system, the built-in administrator account -- the first account created when the OS was installed -- has the highest permissions of any profile on the computer system.
  • bus network - A bus network is a local area network (LAN) topology in which each node -- a workstation or other device -- is connected to a main cable or link called a bus.
  • cache - A cache -- pronounced CASH -- is hardware or software that is used to store something, usually data, temporarily in a computing environment.
  • caching - Caching -- pronounced "cashing" -- is the process of storing data in a cache, which is a temporary storage area that facilitates faster access to data with the goal of improving application and system performance.
  • canonical name (CNAME) - A canonical name (CNAME) is a type of Domain Name System (DNS) database record that indicates that a domain name is the nickname or alias for another domain name.
  • captive portal - A captive portal is a Web page that the user of a public-access network is obliged to view and interact with before access is granted.
  • change request - A change request is a formal proposal for an alteration to some product or system.
  • Chaos Monkey - Chaos Monkey is a software tool that was developed by Netflix engineers to test the resiliency and recoverability of their Amazon Web Services (AWS).
  • chatty protocol - A chatty protocol is an application or routing protocol requiring a client or server to wait for an acknowledgment before transmitting data again.
  • chief integration officer (CIO) - A chief integration officer (CIO) is a corporate executive in charge of ensuring the coordination of all interacting systems within the enterprise and its extended environments.
  • CIDR (Classless Inter-Domain Routing or supernetting) - CIDR (Classless Inter-Domain Routing or supernetting) is a method of assigning IP addresses that improves the efficiency of address distribution and replaces the previous system based on Class A, Class B and Class C networks.
  • circular logging - Circular logging is a method of conserving hard disk space in the Microsoft Exchange transactional logging process.
  • Cisco Enterprise Agreement (EA) - Cisco Enterprise Agreement (EA) is a software buying program that digitizes and simplifies license management for Cisco suite customers.
  • Cisco Identity Services Engine (ISE) - Cisco Identity Services Engine (ISE) is a security policy management platform that provides secure network access to users and devices.
  • Citrix Workspace app (Citrix Receiver) - Citrix Receiver was renamed the Citrix Workspace app in 2018.
  • Class of Service (CoS) - Class of Service (CoS) is a way of managing traffic in a network by grouping similar types of traffic -- such as email, streaming video, voice over IP and large document file transfer -- together and treating each type as a class with its own level of network service priority.
  • clean install - A clean install is a software installation in which any previous version is eradicated.
  • cloaking - Cloaking is the masking of the sender's name and address in an e-mail note or distribution.
  • Clos network - A Clos network is a type of non-blocking, multistage switching architecture that reduces the number of ports required in an interconnected fabric.
  • cloud disaster recovery (cloud DR) - Cloud disaster recovery (cloud DR) is a combination of strategies and services intended to back up data, applications and other resources to public cloud or dedicated service providers.
  • cloud ecosystem - A cloud ecosystem is a complex system of interdependent components that all work together to enable cloud services.
  • cloud service latency - Latency greatly affects how usable and enjoyable devices and communications are.
  • cloud storage API - A cloud storage API is an application programming interface that connects a locally based application to a cloud-based storage system so that a user can send data to it and access and work with data stored in it.
  • cloud storage gateway - A cloud storage gateway is a hardware- or software-based appliance that serves as a bridge between local applications and remote cloud-based storage.
  • cloud-native network function (CNF) - A cloud-native network function (CNF) is a service that performs network duties in software, as opposed to purpose-built hardware.
  • cluster quorum disk - A cluster quorum disk is the storage medium on which the configuration database is stored for a cluster computing network.
  • CMDB (configuration management database) - A configuration management database (CMDB) is a file -- usually, in the form of a standardized database -- that contains all relevant information about the hardware and software components used in an organization's IT (information technology) services and the relationships between those components.
  • CNAME - A CNAME specifies an alias or nickname for a canonical name record in a domain name system (DNS) database.
  • codec - A codec is a hardware- or software-based process that compresses and decompresses large amounts of data.
  • collision - In a half duplex Ethernet network, a collision is the result of two devices on the same network attempting to transmit data at exactly the same time.
  • command prompt - A command prompt is the input field in a text-based user interface screen for an operating system (OS) or program.
  • computer network - A computer network, also referred to as a data network, is a series of interconnected nodes that can transmit, receive and exchange data, voice and video traffic.
  • conductance - Conductance is an expression of the ease with which electric current flows through materials like metals and nonmetals.
  • Conficker - Conficker is a fast-spreading worm that targets a vulnerability (MS08-067) in Windows operating systems.
  • connectionless - In telecommunications, connectionless describes communication between two network endpoints in which a message can be sent from one endpoint to another without prior arrangement.
  • content-addressed memory (CAM) - Content-addressable memory (CAM) is computer memory that operates like a hardware search engine for search-intensive applications.
  • converged network adapter (CNA) - A converged network adapter (CNA) is a single network interface device that provides the functionality of both a Fibre Channel (FC) host bus adapter (HBA) and a TCP/IP Ethernet network interface card (NIC).
  • COPE (corporate-owned, personally enabled) - COPE (corporate-owned personally-enabled) is a business model in which an organization provides its employees with mobile computing devices and allows the employees to use them as if they were personally-owned notebook computers, tablets or smartphones.
  • CPE device - A CPE device is telecommunications hardware located at the home or business of a customer.
  • CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) - CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) is a protocol for carrier transmission in 802.
  • custom domain name suffix (custom TLD) - A custom domain name suffix, or custom TLD, is a top-level domain (TLD) name that belongs to a single organization.
  • CYOD (choose your own device) - CYOD (choose your own device) is an alternative model to BYOD (bring your own device) that involves allowing employees to select the device they want from among a limited number of options.
  • data availability - Data availability is a term used by computer storage manufacturers and storage service providers to describe how data should be available at a required level of performance in situations ranging from normal through disastrous.
  • data breach - A data breach is a cyber attack in which sensitive, confidential or otherwise protected data has been accessed or disclosed in an unauthorized fashion.
  • data center bridging (DCB) - DCB is a suite of IEEE standards designed to enable lossless transport over Ethernet and a converged network for all data center applications.
  • data center services - Data center services is a collective term for all the supporting components necessary to the proper operation of data center.
  • data link layer - The data link layer is the protocol layer in a program that handles the moving of data into and out of a physical link in a network.
  • data protection management (DPM) - Data protection management (DPM) comprises the administration, monitoring and management of backup processes to ensure backup tasks run on schedule and data is securely backed up and recoverable.
  • data reduction - Data reduction is the process of reducing the amount of capacity required to store data.
  • data streaming - Data streaming is the continuous transfer of data at a steady, high-speed rate.
  • deep packet inspection (DPI) - Deep packet inspection (DPI) is an advanced method of examining and managing network traffic.
  • desktop management interface (DMI) - The desktop management interface (DMI) is a standard industry framework that manages and tracks components on one or more personal computers, usually from a centralized console.
  • desktop virtualization - Desktop virtualization is the concept of isolating a logical operating system (OS) instance from the client that is used to access it.
  • device as a service (DaaS) - The device as a service (DaaS) model offers PCs, smartphones and other mobile computing devices as a paid service.
  • DHCP (Dynamic Host Configuration Protocol) - DHCP (Dynamic Host Configuration Protocol) is a network management protocol used to dynamically assign an IP address to any device, or node, on a network so it can communicate using IP.
  • Differentiated Services (DiffServ, or DS) - Differentiated Services (DiffServ, or DS) is a protocol for specifying and controlling network traffic by class so that certain types of traffic get precedence - for example, voice traffic, which requires a relatively uninterrupted flow of data, might get precedence over other kinds of traffic.
  • DirectAccess - DirectAccess is a feature introduced in Windows Server 2008 R2 and Windows 7 that uses automated IPv6 and IPSec tunnels to allow remote users to access private network resources whenever they are connected to the Internet.
  • Directory Services Restore Mode (DSRM) - Directory Services Restore Mode (DSRM) is a safe mode boot option for Windows Server domain controllers.
  • disaggregated server - A disaggregated server is a server that breaks up components and resources into subsystems.
  • discrete event simulation (DES) - Discrete event simulation (DES) is the process of codifying the behavior of a complex system as an ordered sequence of well-defined events.
  • disk image - A disk image is a copy of the entire contents of a storage device, such as a hard drive, DVD, or CD.
  • Diskpart (Disk Partition Utility) - Diskpart is a command-line utility used to manipulate disk partitions in all versions of Windows and Windows Server beginning with Windows XP and Windows Server 2003.
  • distributed - Computing is said to be "distributed" when the computer programming and data that computers work on are spread out over more than one computer, usually over a network.
  • distributed antenna system (DAS) - A distributed antenna system (DAS) is a way to deal with isolated spots of poor coverage inside a large building by installing a network of relatively small antennas throughout the building to serve as repeaters.
  • Distributed Component Object Model (DCOM) - Distributed Component Object Model (DCOM) is an extension to Component Object Model (COM) that enables software components to communicate with each other across different computers on a local area network (LAN), on a wide area network (WAN) or across the internet.
  • DNS redirection - DNS redirection is the controversial practice of serving a Web page to a user that is different from either the one requested or one that might reasonably be expected, such as an error page.
  • domain controller - A domain controller is a type of server that processes requests for authentication from users within a computer domain.
  • dynamic port numbers - Dynamic port numbers, also known as private port numbers, are the port numbers that are available for use by any application to use in communicating with any other application, using the internet's Transmission Control Protocol (TCP) or User Datagram Protocol (UDP).
  • eavesdropping - Eavesdropping is the unauthorized real-time interception of a private communication, such as a phone call, instant message, videoconference or fax transmission.
Networking
  • network management system

    A network management system, or NMS, is an application or set of applications that lets network engineers manage a network's ...

  • host (in computing)

    A host is a computer or other device that communicates with other hosts on a network.

  • Network as a Service (NaaS)

    Network as a service, or NaaS, is a business model for delivering enterprise WAN services virtually on a subscription basis.

Security
  • SOC 3 (System and Organization Controls 3)

    A System and Organization Controls 3 (SOC 3) report outlines information related to a service organization's internal controls ...

  • tokenization

    Tokenization is the process of replacing sensitive data with unique identification symbols that retain all the essential ...

  • messaging security

    Messaging security is a subcategory of unified threat management, or UTM, focused on securing and protecting an organization's ...

CIO
  • value stream management

    Value stream management is an emerging business process intended to gauge the flow of value into business resources and ...

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

  • blockchain decentralization

    Decentralization is the distribution of functions, control and information instead of being centralized in a single entity.

HRSoftware
  • team collaboration

    Team collaboration is a communication and project management approach that emphasizes teamwork, innovative thinking and equal ...

  • employee self-service (ESS)

    Employee self-service (ESS) is a widely used human resources technology that enables employees to perform many job-related ...

  • learning experience platform (LXP)

    A learning experience platform (LXP) is an AI-driven peer learning experience platform delivered using software as a service (...

Customer Experience
  • Net Promoter Score (NPS)

    Net Promoter Score (NPS) is a metric that organizations use for assessing customer loyalty toward their brand, products or ...

  • B2C (business-to-consumer)

    B2C, or business-to-consumer, is a retail model where products or services move directly from a business to the end user who has ...

  • market segmentation

    Market segmentation is a marketing strategy that uses well-defined criteria to divide a brand's total addressable market share ...

Close