Browse Definitions :

Networking and communications

Terms related to networking and communications, including definitions about network protocols and words and phrases about data transmission.

DYN - NET

  • dynamic multipoint VPN (DMVPN) - A dynamic multipoint virtual private network (DMVPN) is a secure network that exchanges data between sites/routers without passing traffic through an organization's virtual private network (VPN) server or router located at its headquarters.
  • dynamic port numbers - Dynamic port numbers, also known as private port numbers, are the port numbers that are available for use by any application to use in communicating with any other application, using the internet's Transmission Control Protocol (TCP) or User Datagram Protocol (UDP).
  • E911 (Enhanced 911) - In the United States, E911 (Enhanced 91 is support for wireless phone users who dial 911, the standard number for requesting help in an emergency.
  • east-west traffic - East-west traffic, in a networking context, is the transfer of data packets from server to server within a data center.
  • eavesdropping - Eavesdropping is the unauthorized real-time interception of a private communication, such as a phone call, instant message, videoconference or fax transmission.
  • electric grid - An electric grid is a network of synchronized power providers and consumers that are connected by transmission and distribution lines and operated by one or more control centers.
  • electromagnetic interference (EMI) - Electromagnetic interference (EMI) is unwanted noise or interference in an electrical path or circuit caused by an outside source.
  • encoding and decoding - Encoding and decoding are used in many forms of communications, including computing, data communications, programming, digital electronics and human communications.
  • end-to-end principle - The end-to-end principle is a network design method in which application-specific features are kept at communication end points.
  • event - An event, in a computing context, is an action or occurrence that can be identified by a program and has significance for system hardware or software.
  • event stream processing (ESP) - Event stream processing (ESP) is a software capacity designed to support implementation of event-driven architectures.
  • extranet - An extranet is a private network that enterprises use to provide trusted third parties -- such as suppliers, vendors, partners, customers and other businesses -- secure, controlled access to business information or operations.
  • FCoE (Fibre Channel over Ethernet) - FCoE (Fibre Channel over Ethernet) is a storage protocol that enable Fibre Channel (FC) communications to run directly over Ethernet.
  • FDDI (Fiber Distributed Data Interface) - FDDI (Fiber Distributed Data Interface) is a network standard that uses fiber optic connections in a local area network (LAN) that can extend in range up to 200 kilometers (124 miles).
  • fiber optics (optical fiber) - Fiber optics, or optical fiber, refers to the technology that transmits information as light pulses along a glass or plastic fiber.
  • fiber to the x (FTTx) - Fiber to the x (FTTx) is a collective term for various optical fiber delivery topologies that are categorized according to where the fiber terminates.
  • File Transfer Access and Management (FTAM) - File Transfer Access and Management (FTAM) is an OSI application Layer 7 protocol that standardizes how files are accessed and managed in a distributed network file system.
  • filter (computing) - The term filter in computing can mean a variety of things, depending on the technology or technical discipline in question.
  • FiOS (Fiber Optic Service) - FiOS (Fiber Optic Service) is a fiber to the premises (FTTP) telecommunications service offered by Verizon to consumers in the United States.
  • fixed-length subnet mask (FLSM) - A fixed-length subnet mask (FLSM) refers to a type of enterprise or provider networking where a block of IP addresses is divided into multiple subnets of equal length (i.
  • flow routing - Flow routing is a network routing technology that takes variations in the flow of data into account to increase routing efficiency.
  • forward error correction (FEC) - Forward error correction (FEC) is a method of obtaining error control in data transmission in which the source (transmitter) sends redundant data and the destination (receiver) recognizes only the portion of the data that contains no apparent errors.
  • free-space optics (FSO) - Free-space optics (FSO), also called free-space photonics (FSP), refers to the transmission of modulated visible or infrared (IR) beams through the atmosphere to obtain broadband communications.
  • frequency jammer - Frequency jamming is the disruption of radio signals through use of an over-powered signal in the same frequency range.
  • frequency-shift keying (FSK) - Frequency-shift keying (FSK) is a method of transmitting digital signals using discrete signals.
  • fronthaul - Fronthaul, also known as mobile fronthaul, is a term that refers to the fiber-based connection of the cloud radio access network (C-RAN), a new type of cellular network architecture of centralized baseband units (BBUs) and remote radio heads (RRHs) at the access layer of the network.
  • FTP (File Transfer Protocol) - FTP (File Transfer Protocol) is a network protocol for transmitting files between computers over TCP/IP connections.
  • full-duplex - Full-duplex data transmission means that data can be transmitted in both directions on a signal carrier at the same time.
  • Gbps (billions of bits per second) - Gbps stands for billions of bits per second and is a measure of bandwidth on a digital data transmission medium such as optical fiber.
  • geostationary satellite - A geostationary satellite is an earth-orbiting satellite, placed at an altitude of approximately 35,800 kilometers (22,300 miles) directly over the equator, that revolves in the same direction the earth rotates (west to east).
  • gigabit interface converter (GBIC) - A gigabit interface converter (GBIC) is a transceiver that converts electric currents (digital highs and lows) to optical signals, and optical signals to digital electric currents.
  • globalization - Globalization is the process by which ideas, goods and services spread throughout the world.
  • green networking - Green networking is the practice of selecting energy-efficient networking technologies and products, and minimizing resource use whenever possible.
  • greenfield deployment - A greenfield deployment is the design, installation and configuration of computer infrastructure where none existed before, for example, in a new office.
  • GUID (global unique identifier) - A GUID (globally unique identifier) is a 128-bit text string that represents an identification (ID).
  • hairpinning - In general telecommunication, hairpinning is returning a message from an origin endpoint back in the direction it came from as a way to get it to its destination endpoint.
  • half-duplex - Half-duplex data transmission means that data can be transmitted in both directions on a signal carrier, but not at the same time.
  • HDLC (High-level Data Link Control) - HDLC (High-level Data Link Control) is a group of protocols or rules for transmitting data between network points (sometimes called nodes).
  • hop off - Hop off is a term used in telecommunications that refers to a point at which a signal or call leaves a network and moves to another network.
  • Hot Spot 2.0 (HS 2.0) - Hot Spot 2.0 (HS 2.
  • HTTP (Hypertext Transfer Protocol) - HTTP (Hypertext Transfer Protocol) is the set of rules for transferring files -- such as text, images, sound, video and other multimedia files -- over the web.
  • IDSL - IDSL is a hybrid of a digital subscriber line (DSL) and integrated services digital network (ISDN) technology that transmits data slightly faster than ISDN but much slower than most DSL services.
  • IEEE 802.3 - 802.3, or IEEE 802.
  • Indefeasible Right of Use (IRU) - In telecommunications, the Indefeasible Right of Use (IRU) is a contractual agreement (temporary ownership) of a portion of the capacity of an international cable.
  • InfiniBand - InfiniBand is an industry standard communications specification the InfiniBand Trade Association (IBTA) developed.
  • infrared transmission - Infrared transmission refers to energy in the region of the electromagnetic radiation spectrum at wavelength s longer than those of visible light, but shorter than those of radio.
  • initialization vector - An initialization vector (IV) is an arbitrary number that can be used with a secret key for data encryption to foil cyber attacks.
  • integration server - An integration server is a type of computer server that facilitates the interaction between different operating systems (OSes), services and applications across an enterprise IT environment.
  • international private leased circuit (IPLC) - An international private leased circuit (IPLC) is a point-to-point private line used by an organization to communicate between offices that are dispersed throughout the world.
  • Internet Key Exchange (IKE) - Internet Key Exchange (IKE) is a standard protocol used to set up a secure and authenticated communication channel between two parties via a virtual private network (VPN).
  • internet metering - Internet metering is a service model in which an internet service provider (ISP) keeps track of bandwidth use and charges users accordingly.
  • Internet Protocol (IP) - The Internet Protocol (IP) is the method or protocol by which data is sent from one computer to another on the internet.
  • Internet Protocol suite (IP suite) - Internet Protocol suite (IP suite) is the standard network model and communication protocol stack used on the Internet and on most other computer networks.
  • intranet of things - An intranet of things is a closed network that includes smart sensors and actuators.
  • IoT middleware (Internet of Things middleware) - Internet of Things (IoT) middleware is software that serves as an interface between components of the IoT, joining elements that would not otherwise be able to connect and communicate.
  • IoT security (internet of things security) - IoT security is the technology segment focused on safeguarding connected devices and networks in the internet of things (IoT).
  • IP PBX (private branch exchange) - An IP PBX is a private branch exchange (telephone switching system within an enterprise) that switches calls between VoIP (voice over Internet Protocol or IP) users on local lines while allowing all users to share a certain number of external phone lines.
  • IPTV (Internet Protocol television) - IPTV (Internet Protocol television) is a service that provides television programming and other video content using the Transmission Control Protocol/Internet Protocol (TCP/IP) suite, as opposed to broadcast TV, cable TV or satellite signals.
  • IPv4 address class - An IPv4 address class is a categorical division of internet protocol addresses in IPv4-based routing.
  • IPv6 address - An IPv6 address is a 128-bit alphanumeric value that identifies an endpoint device in an Internet Protocol Version 6 (IPv6) network.
  • IPX (Internetwork Packet Exchange) - IPX (Internetwork Packet Exchange) is a networking protocol from Novell that interconnects networks that use Novell's NetWare clients and servers.
  • ISA (Industry Standard Architecture) - ISA (Industry Standard Architecture) is a standard bus (computer interconnection) architecture that was associated with the IBM AT motherboard.
  • ISP (internet service provider) - An ISP (internet service provider) is a company that provides individuals and companies access to the internet and other related services.
  • ITCH - ITCH is a direct data-feed interface that allows customers of the NASDAQ (National Association of Securities Dealers Automated Quotations) to observe or disseminate information about stock trading activities.
  • iterative DNS query - An iterative DNS query is a request for a website name or uniform resource locator (URL) that the domain name system (DNS) server responds to with the IP address from its zone file cache, if possible.
  • jitter - Jitter is any deviation in, or displacement of, the signal pulses in a high-frequency digital signal.
  • jumbo frames - A jumbo frame is an Ethernet frame with a payload greater than the standard maximum transmission unit (MTU) of 1,500 bytes.
  • leaky bucket algorithm - The leaky bucket algorithm is a "traffic shaping" algorithm to reduce the load the transport layer places on the network layer and reduce congestion in the network.
  • LEAP (Lightweight Extensible Authentication Protocol) - LEAP (Lightweight Extensible Authentication Protocol) is a Cisco-proprietary version of EAP, the authentication protocol used in wireless networks and Point-to-Point connections.
  • leased line - A leased line is a bidirectional telephone line that has been rented for private voice, data exchange or telecommunication use.
  • Link Control Protocol (LCP) - In computer networking, Point-to-Point Protocol (PPP) provides a standard way to transport multiprotocol data over point-to-point links; within PPP, Link Control Protocol (LCP) establishes, configures and tests data link internet connections.
  • link layer discovery protocol (LLDP) - The link layer discovery protocol (LLDP) is an open and extendable part of the Internet protocol suite used in IEEE 802 to advertise a device’s identity and abilities, as well as other devices connected within the same network.
  • load testing - Load testing is the process of subjecting a computer, peripheral, server, network or application to a work level approaching the limits of its specifications.
  • local area network (LAN) - A local area network (LAN) is a group of computers and peripheral devices that share a common communications line or wireless link to a server within a distinct geographic area.
  • log analytics - Log analytics is the assessment of a recorded set of information from one or more events, captured from a computer, network, application operating system (OS) or other IT ecosystem component.
  • logical network - A logical network is one that appears to the user as a single, separate entity although it might in fact be either just a part of a larger network or an entity connecting multiple networks.
  • loopback test - A loopback test is a test in which a signal in sent from a communications device and returned (looped back) to it as a way to determine whether the device is working right or as a way to pin down a failing node in a network.
  • loose coupling - Loose coupling is a method of interconnecting the components in a system or network so that those components, also called elements, depend on each other to the least extent practicable.
  • low earth orbit (LEO) satellite - A low earth orbit (LEO) satellite is an object, generally an electronic piece of equipment, that circles around the earth at lower altitudes than geosynchronous satellites.
  • LTE (Long-Term Evolution) - LTE (Long-Term Evolution) is a standard for 4G wireless technology that offers increased network capacity and speed for cellphones and other cellular devices compared with 3G.
  • LZW compression - LZW compression is the compression of a file into a smaller file using a table-based lookup algorithm invented by Abraham Lempel, Jacob Ziv, and Terry Welch.
  • machine-to-machine (M2M) - Machine-to-machine, or M2M, is a broad label that can be used to describe any technology that enables networked devices to exchange information and perform actions without the manual assistance of humans.
  • managed file transfer (MFT) - Managed file transfer (MFT) is a type of software used to provide secure internal, external and ad-hoc data transfers through a network.
  • Manchester encoding - In data transmission, Manchester encoding is a form of digital encoding in which data bits are represented by transitions from one logical state to the other.
  • MDI/MDIX (medium-dependent interface/MDI crossover) - MDI/MDIX is a type of Ethernet port connection that uses twisted-pair cabling to link two networked devices.
  • megabits per second (Mbps) - Megabits per second (Mbps) are units of measurement for network bandwidth and throughput.
  • Microsoft Assessment and Planning (MAP) Toolkit - Microsoft Assessment and Planning (MAP) Toolkit is a free utility IT can use to determine whether or not its infrastructure is prepared for a migration to a new operating system, server version or cloud-based deployment.
  • Microsoft Azure - Microsoft Azure, formerly known as Windows Azure, is Microsoft's public cloud computing platform.
  • Microsoft Teams - What is Microsoft Teams? Microsoft Teams is cloud-based team collaboration software that is part of the Microsoft 365 and Office 365 suite of applications.
  • MiFi - MiFi is a portable broadband device that allows multiple end users and mobile devices to share a 3G or 4G mobile broadband Internet connection and create an ad-hoc network.
  • MIMO (multiple input, multiple output) - MIMO (multiple input, multiple output) is an antenna technology for wireless communications in which multiple antennas are used at both the source (transmitter) and the destination (receiver).
  • Multipath I/O (MPIO) - Multipath I/O (MPIO) is a Microsoft framework designed to mitigate the effects of a host bus adapter (HBA) failure by providing an alternate data path between storage network devices.
  • multipoint control unit (MCU) - A multipoint control unit (MCU) is a type of video conferencing hardware that bridges terminals involved into a multi-point conference system.
  • NACK (NAK, negative acknowledgment, not acknowledged) - NACK, or NAK, an abbreviation for negative acknowledgment or not acknowledged, is a signal used by computers or other devices to indicate that data transmitted over a network was received with errors or was otherwise unreadable.
  • Nagios - Nagios is an open source monitoring system for computer systems.
  • NBASE-T Ethernet - NBASE-T Ethernet is an IEEE standard and Ethernet-signaling technology that allows existing twisted-pair copper cabling to exceed the cable's specified limit of 1 Gbps for distances of up to 100 meters.
  • NBMA (non-broadcast multiple access) - Non-broadcast multiple access (NBMA) is one of four network types in the Open Shortest Path First (OSPF) communications protocol.
SearchNetworking
  • CIDR (Classless Inter-Domain Routing or supernetting)

    CIDR (Classless Inter-Domain Routing or supernetting) is a method of assigning IP addresses that improves the efficiency of ...

  • throughput

    Throughput is a measure of how many units of information a system can process in a given amount of time.

  • traffic shaping

    Traffic shaping, also known as packet shaping, is a congestion management method that regulates network data transfer by delaying...

SearchSecurity
  • Common Body of Knowledge (CBK)

    In security, the Common Body of Knowledge (CBK) is a comprehensive framework of all the relevant subjects a security professional...

  • buffer underflow

    A buffer underflow, also known as a buffer underrun or a buffer underwrite, is when the buffer -- the temporary holding space ...

  • single sign-on (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials -- for ...

SearchCIO
  • benchmark

    A benchmark is a standard or point of reference people can use to measure something else.

  • spatial computing

    Spatial computing broadly characterizes the processes and tools used to capture, process and interact with 3D data.

  • organizational goals

    Organizational goals are strategic objectives that a company's management establishes to outline expected outcomes and guide ...

SearchHRSoftware
  • talent acquisition

    Talent acquisition is the strategic process employers use to analyze their long-term talent needs in the context of business ...

  • employee retention

    Employee retention is the organizational goal of keeping productive and talented workers and reducing turnover by fostering a ...

  • hybrid work model

    A hybrid work model is a workforce structure that includes employees who work remotely and those who work on site, in a company's...

SearchCustomerExperience
Close