Browse Definitions :

Network administration

Terms related to managing computer networks, including definitions about LANS or WANS and words and phrases about network design, troubleshooting, security and backups.

NET - STA

  • NetBIOS (Network Basic Input/Output System) - NetBIOS (Network Basic Input/Output System) is a network service that enables applications on different computers to communicate with each other across a local area network (LAN).
  • NETCONF - NETCONF is an IETF network management protocol that provides an administrator or network engineer with a secure way to configure a firewall, router, switch or other network device.
  • Network Address Translation (NAT) - A Network Address Translation (NAT) is the process of mapping an internet protocol (IP) address to another by changing the header of IP packets while in transit via a router.
  • network analytics - Network analytics is the application of big data principles and tools to the data used to manage and secure data networks.
  • Network as a Service (NaaS) - Network as a service, or NaaS, is a business model for delivering enterprise WAN services virtually on a subscription basis.
  • network automation - Network automation is a methodology in which software automatically configures, provisions, manages and tests network devices.
  • network availability - Network availability is the amount of uptime in a network system over a specific time interval.
  • network configuration management (NCM) - Network configuration management is the process of organizing and maintaining information about all of the components in a computer network.
  • Network Data Management Protocol (NDMP) - Network Data Management Protocol (NDMP) is an open protocol to control data backup and recovery communications between primary and secondary storage in a heterogeneous network environment.
  • network disaster recovery plan - A network disaster recovery plan is a set of procedures designed to prepare an organization to respond to an interruption of network services during a natural or humanmade catastrophe.
  • network drive - A network drive is a storage device on a local access network (LAN) within a business or home.
  • network engineer - A network engineer is a technology professional who has the necessary skills to plan, implement and oversee the computer networks that support in-house voice, data, video and wireless network services.
  • network fabric - Network fabric is an industry term that describes a network topology in which devices pass data to each other through interconnecting switches.
  • network functions virtualization (NFV) - Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have traditionally run on proprietary, dedicated network appliances.
  • network intrusion protection system (NIPS) - A network intrusion protection system (NIPS) is an umbrella term for a combination of hardware and software systems that protect computer networks from unauthorized access and malicious activity.
  • Network layer - Located at Layer 3 of the Open Systems Interconnection (OSI) communications model, the primary function of the network layer is to move data into and through other networks.
  • network management system - A network management system, or NMS, is an application or set of applications that lets network engineers manage a network's independent components inside a bigger network management framework and performs several key functions.
  • Network Node Manager i (NNMi) - The Network Node Manager i (NNMi) is a program that helps a network administrator view and manage the conditions in a computer network.
  • network operating system (NOS) - A network operating system (NOS) is a computer operating system (OS) that's designed primarily to support workstations, PCs and, in some instances, older terminals that are connected on a local area network (LAN).
  • network operations center (NOC) - A network operations center (NOC) is a centralized place from which enterprise information technology (IT) administrators -- either internal or third party -- supervise, monitor and maintain a telecommunications network.
  • network packet - A network packet is a basic unit of data that's grouped together and transferred over a computer network, typically a packet-switched network, such as the internet.
  • network performance monitoring - Network performance monitoring is a process of measuring and monitoring the quality of service of a network to understand if it is properly operating.
  • network protocol - A network protocol is a set of established rules that specify how to format, send and receive data so that computer network endpoints, including computers, servers, routers and virtual machines, can communicate despite differences in their underlying infrastructures, designs or standards.
  • network security - Network security encompasses all the steps taken to protect the integrity of a computer network and the data within it.
  • network service provider (NSP) - A network service provider (NSP) is a company that owns, operates and sells access to internet backbone infrastructure and services.
  • network socket - Sockets are created and used with a set of programming requests or "function calls" sometimes called the sockets application programming interface (API).
  • Network Time Protocol (NTP) - Network Time Protocol (NTP) is an internet protocol used to synchronize with computer clock time sources in a network.
  • Next Hop Resolution Protocol (NHRP) - Next Hop Resolution Protocol (NHRP) is an automated configuration technology that routes data on a distributed network by discovering the best routing path between endpoints.
  • NFV MANO (network functions virtualization management and orchestration) - NFV MANO (network functions virtualization management and orchestration), also called MANO, is an architectural framework for managing and orchestrating virtualized network functions (VNFs) and other software components.
  • NFVi (network functions virtualization infrastructure) - NFVi (network functions virtualization infrastructure) encompasses all of the networking hardware and software needed to support and connect virtual network functions in carrier networks.
  • Nginx - Nginx (pronounced engine x) is open source webserver software that also performs reverse proxy, load balancing, email proxy and HTTP cache services.
  • NIS (Network Information System) - NIS (Network Information System) is a network naming and administration system for smaller networks that was developed by Sun Microsystems.
  • northbound interface/southbound interface - A northbound interface is an application programming interface (API) or protocol that allows a lower-level network component to communicate with a higher-level or more central component, while -- conversely -- a southbound interface allows a higher-level component to send commands to lower-level network components.
  • NVGRE (Network Virtualization using Generic Routing Encapsulation) - NVGRE (Network Virtualization using Generic Routing Encapsulation) is a network virtualization method that uses encapsulation to create large numbers of virtual LANs (VLANs) for subnets that can extend across dispersed data centers and Layers 2 and 3.
  • Open Grid Services Architecture (OGSA) - The Open Grid Services Architecture (OGSA) is a set of standards defining the way in which information is shared among diverse components of large, heterogeneous grid systems.
  • open networking - Open networking describes a network that uses open standards and commodity hardware.
  • OpenFlow - OpenFlow is a protocol that allows a server to tell network switches where to send packets.
  • operational level agreement (OLA) - An operational level agreement (OLA) is a contract that defines how various IT groups within a company plan to deliver a service or set of services.
  • operational support system (OSS) - An operational support system (OSS) is a set of programs that help a communications service provider monitor, control, analyze and manage a telephone or computer network.
  • operational technology (OT) - Operational technology (OT) is a category of hardware and software that monitors and controls how physical devices perform.
  • OpLock (opportunistic lock) - OpLocks are made to enable simultaneous file access by multiple users while also improving performance for synchronized caches.
  • OSI model (Open Systems Interconnection) - OSI (Open Systems Interconnection) is a reference model for how applications communicate over a network.
  • OTA update (over-the-air update) - An over-the-air (OTA) update is the wireless delivery of new software, firmware or other data to mobile devices.
  • packet coalescing - In network adapters using Network Driver Interface Specification (NDIS) versions 6.
  • passive optical network (PON) - A passive optical network (PON) is a system commonly used by telecommunications network providers that brings fiber optic cabling and signals all or most of the way to the end user.
  • peer-to-peer (P2P) - Peer-to-peer (P2P) is a decentralized communications model in which each party has the same capabilities and either party can initiate a communication session.
  • performance testing - Performance testing is a testing measure that evaluates the speed, responsiveness and stability of a computer, network, software program or device under a workload.
  • personal area network (PAN) - A personal area network (PAN) interconnects technology devices, typically within the range of a single user, which is approximately 10 meters or 33 feet.
  • piggybacking - Piggybacking, in the context of Wi-Fi, is the use of a wireless connection to gain access to the internet without proper authority.
  • ping - A ping (Packet Internet or Inter-Network Groper) is a basic internet program that enables a user to test and verify if a particular destination Internet Protocol (IP) address exists and can accept requests in computer network administration.
  • ping sweep (ICMP sweep) - A ping sweep (also known as an ICMP sweep) is a basic network scanning technique used to determine which of a range of IP addresses map to live hosts (computers).
  • poison reverse - In a computer network that uses the Routing Information Protocol (RIP) or other distance vector routing protocol, poison reverse is a loop avoidance process.
  • policy engine - A policy engine is a software component that allows an organization to create, monitor and enforce rules about how network resources and the organization's data can be accessed.
  • polling (computing) - In computer science, polling or a polled operation denotes the process of repeatedly sampling the status of external devices by a client program.
  • Port Address Translation (PAT) - Port Address Translation (PAT), is an extension to network address translation (NAT) that permits multiple devices on a local area network (LAN) to be mapped to a single public IP address.
  • port number - Port number is a way to identify a specific process to which an internet or other network message is to be forwarded when it arrives at a server.
  • power usage effectiveness (PUE) - Power usage effectiveness (PUE) is a metric used to determine the energy efficiency of a data center.
  • private certificate authority (CA) - Private CA stands for private certificate authority and is an enterprise specific certificate authority that functions like a publicly trusted CA but is exclusively run by or for the enterprise.
  • private cloud appliance - A private cloud appliance is a hardware device that provides software-defined converged infrastructure functions for an organization’s proprietary network.
  • private IP address - A private IP address is a range of non-internet facing IP addresses used in an internal network.
  • privileged identity management (PIM) - Privileged identity management (PIM) is the monitoring and protection of superuser accounts in an organization’s IT environments.
  • programmable logic controller (PLC) - A programmable logic controller (PLC) is a small, modular solid state computer with customized instructions for performing a particular task.
  • promiscuous mode - In computer networking, promiscuous mode is a mode of operation, as well as a security, monitoring and administration technique.
  • proxy hacking - Proxy hacking is a cyber attack technique designed to supplant an authentic webpage in a search engine's index and search results pages to drive traffic to an imitation site.
  • proxy server - A proxy server is a dedicated computer or a software system running on a computer that acts as an intermediary between an endpoint device, such as a computer, and another server from which a user or client is requesting a service.
  • push (or server-push) - Push (or "server-push") is the delivery of information on the Web that is initiated by the information server rather than by the information user or client, as it usually is.
  • quality of service (QoS) - Quality of service (QoS) refers to any technology that manages data traffic to reduce packet loss, latency and jitter on a network.
  • race condition - A race condition is an undesirable situation that occurs when a device or system attempts to perform two or more operations at the same time, but because of the nature of the device or system, the operations must be done in the proper sequence to be done correctly.
  • RADIUS (Remote Authentication Dial-In User Service) - RADIUS (Remote Authentication Dial-In User Service) is a client-server protocol and software that enables remote access servers to communicate with a central server to authenticate dial-in users and authorize their access to the requested system or service.
  • RAT (remote access Trojan) - A RAT (remote access Trojan) is malware an attacker uses to gain full administrative privileges and remote control of a target computer.
  • Real Time Streaming Protocol (RTSP) - Real Time Streaming Protocol (RTSP) is an application-level network communication system that transfers real-time data from multimedia to an endpoint device by communicating directly with the server streaming the data.
  • real-time application (RTA) - A real-time application is an application program that functions within a time frame that the user senses as immediate or current.
  • real-time location system (RTLS) - A real-time location system (RTLS) is one of a number of technologies used to pinpoint the current geographic position and location of a target.
  • real-time monitoring - Real-time (data) monitoring is the delivery of continuously updated information streaming at zero or low latency.
  • Real-time Transport Protocol (RTP) - Real-time Transport Protocol (RTP) is a network standard designed for transmitting audio or video data that is optimized for consistent delivery of live data.
  • Receive Segment Coalescing (RSC) - Receive Segment Coalescing (RSC) is an offload technology in Windows Server 2012 and Windows Server 2012 R2 that can help reduce how much of the CPU is used in network processing.
  • Reliability, Availability and Serviceability (RAS) - Reliability, Availability and Serviceability (RAS) is a set of related attributes that must be considered when designing, manufacturing, purchasing or using a computer product or component.
  • remote access - Remote access is the ability for an authorized person to access a computer or network from a geographical distance through a network connection.
  • remote desktop - A remote desktop is a program or an operating system feature that allows a user to connect to a computer in another location, see that computer's desktop and interact with it as if it were local.
  • remote desktop protocol (RDP) - Remote desktop protocol (RDP) is a secure network communications protocol from Microsoft.
  • Rich Internet Application (RIA) - A rich Internet application (RIA) is a Web application designed to deliver the same features and functions normally associated with deskop applications.
  • RMON (Remote Network Monitoring) - RMON (Remote Network Monitoring) provides standard information that a network administrator can use to monitor, analyze, and troubleshoot a group of distributed local area networks (LANs) and interconnecting T-1/E-1 and T-2/E-3 lines from a central site.
  • Routing Information Protocol (RIP) - Routing Information Protocol (RIP) is a distance vector protocol that uses hop count as its primary metric.
  • routing table - A routing table is a set of rules, often viewed in table format, that's used to determine where data packets traveling over an Internet Protocol (IP) network will be directed.
  • RSAT (Microsoft Remote Server Administration Tools) - RSAT (Remote Server Administration Tools) is a feature that began in Windows Server 2008 R2 to help admins remotely manage computers running Windows Server.
  • runbook - Runbooks are a set of standardized written procedures for completing repetitive IT processes within a company.
  • SD-WAN (software-defined WAN) - Software-defined WAN (SD-WAN) is technology that uses software-defined networking (SDN) concepts to distribute network traffic across a wide area network (WAN).
  • SDDC (software-defined data center) - An SDDC (software-defined data center) is a data storage facility in which networking, storage, CPU and security are virtualized and delivered as a service.
  • SDN controller (software-defined networking controller) - An SDN controller is an application in a software-defined networking (SDN) architecture that manages flow control for improved network management and application performance.
  • Secure Access Service Edge (SASE) - Secure Access Service Edge, also known as SASE -- pronounced 'sassy' -- is a cloud architecture that bundles network and security solutions together and delivers them as a unified cloud service.
  • Secure Shell (SSH) - SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system administrators, a secure way to access a computer over an unsecured network.
  • security information management (SIM) - Security information management (SIM) is the practice of collecting, monitoring and analyzing security-related data from computer logs and various other data sources.
  • Server Message Block protocol (SMB protocol) - The Server Message Block protocol (SMB protocol) is a client-server communication protocol used for sharing access to files, printers, serial ports and other resources on a network.
  • service desk - An IT service desk is a communications center that provides a single point of contact (SPOC) between a company, its customers, employees and business partners.
  • service mesh - A service mesh is a dedicated infrastructure layer that controls service-to-service communication over a network.
  • service set identifier (SSID) - A service set identifier (SSID) is a sequence of characters that uniquely names a Wi-Fi network.
  • session border controller (SBC) - A session border controller (SBC) is a dedicated hardware device or software application that governs the manner in which phone calls are initiated, conducted and terminated on a voice over Internet Protocol (VoIP) network.
  • Shared Key Authentication (SKA) - Shared Key Authentication (SKA) is a process by which a computer can gain access to a wireless network that uses the Wired Equivalent Privacy (WEP) protocol.
  • Shodan - Shodan (Sentient Hyper-Optimised Data Access Network) is a search engine designed to map and gather information about internet-connected devices and systems.
  • short message service center (SMSC) - The short message service center (SMSC) is the portion of a mobile phone network that handles text message operations.
Networking
  • voice over LTE (VoLTE)

    Voice over LTE (VoLTE) is a digital packet technology that uses 4G LTE networks to route voice traffic and transmit data.

  • ONOS (Open Network Operating System)

    Open Network Operating System (ONOS) is an OS designed to help network service providers build carrier-grade software-defined ...

  • telematics

    Telematics is a term that combines the words telecommunications and informatics to describe the use of communications and IT to ...

Security
  • three-factor authentication (3FA)

    Three-factor authentication (3FA) is the use of identity-confirming credentials from three separate categories of authentication ...

  • cyber espionage

    Cyber espionage (cyberespionage) is a type of cyber attack that malicious hackers carry out against a business or government ...

  • role-based access control (RBAC)

    Role-based access control (RBAC) is a method of restricting network access based on the roles of individual users within an ...

CIO
  • project charter

    A project charter is a formal short document that states a project exists and provides project managers with written authority to...

  • leadership

    Leadership is the ability of an individual or a group of people to influence and guide followers or members of an organization, ...

  • transaction

    In computing, a transaction is a set of related tasks treated as a single action.

HRSoftware
  • employee engagement

    Employee engagement is the emotional and professional connection an employee feels toward their organization, colleagues and work.

  • talent pool

    A talent pool is a database of job candidates who have the potential to meet an organization's immediate and long-term needs.

  • diversity, equity and inclusion (DEI)

    Diversity, equity and inclusion is a term used to describe policies and programs that promote the representation and ...

Customer Experience
  • sales development representative (SDR)

    A sales development representative (SDR) is an individual who focuses on prospecting, moving and qualifying leads through the ...

  • service level indicator

    A service level indicator (SLI) is a metric that indicates what measure of performance a customer is receiving at a given time.

  • customer data platform (CDP)

    A customer data platform (CDP) is a type of software application that provides a unified platform of customer information that ...

Close