Browse Definitions :

Networking and communications

Terms related to networking and communications, including definitions about network protocols and words and phrases about data transmission.

INT - OSI

  • integration server - An integration server is a type of computer server that facilitates the interaction between different operating systems (OSes), services and applications across an enterprise IT environment.
  • Intel VT (Virtualization Technology) - Intel VT (Virtualization Technology) is the company's hardware assistance for processors running virtualization platforms.
  • interconnection - Interconnection is a strategy for ensuring that businesses can privately, securely and directly exchange digital information.
  • international private leased circuit (IPLC) - An international private leased circuit (IPLC) is a point-to-point private line used by an organization to communicate between offices that are dispersed throughout the world.
  • Internet Key Exchange (IKE) - Internet Key Exchange (IKE) is a standard protocol used to set up a secure and authenticated communication channel between two parties via a virtual private network (VPN).
  • internet metering - Internet metering is a service model in which an internet service provider (ISP) keeps track of bandwidth use and charges users accordingly.
  • Internet Protocol (IP) - The Internet Protocol (IP) is the method or protocol by which data is sent from one computer to another on the internet.
  • Internet Protocol suite (IP suite) - Internet Protocol suite (IP suite) is the standard network model and communication protocol stack used on the Internet and on most other computer networks.
  • intranet of things - An intranet of things is a closed network that includes smart sensors and actuators.
  • IoT middleware (Internet of Things middleware) - Internet of Things (IoT) middleware is software that serves as an interface between components of the IoT, joining elements that would not otherwise be able to connect and communicate.
  • IoT security (internet of things security) - IoT security is the technology segment focused on safeguarding connected devices and networks in the internet of things (IoT).
  • IP PBX (private branch exchange) - An IP PBX is a private branch exchange (telephone switching system within an enterprise) that switches calls between VoIP (voice over Internet Protocol or IP) users on local lines while allowing all users to share a certain number of external phone lines.
  • IPTV (Internet Protocol television) - IPTV (Internet Protocol television) is a service that provides television programming and other video content using the Transmission Control Protocol/Internet Protocol (TCP/IP) suite, as opposed to broadcast TV, cable TV or satellite signals.
  • IPv4 address class - An IPv4 address class is a categorical division of internet protocol addresses in IPv4-based routing.
  • IPv6 address - An IPv6 address is a 128-bit alphanumeric value that identifies an endpoint device in an Internet Protocol Version 6 (IPv6) network.
  • IPX (Internetwork Packet Exchange) - IPX (Internetwork Packet Exchange) is a networking protocol from Novell that interconnects networks that use Novell's NetWare clients and servers.
  • ISA (Industry Standard Architecture) - ISA (Industry Standard Architecture) is a standard bus (computer interconnection) architecture that was associated with the IBM AT motherboard.
  • ISO/IEC 38500 - ISO/IEC 38500 is an international standard created to guide corporate governance of information technology (IT).
  • ISP (internet service provider) - An ISP (internet service provider) is a company that provides individuals and companies access to the internet and other related services.
  • ITCH - ITCH is a direct data-feed interface that allows customers of the NASDAQ (National Association of Securities Dealers Automated Quotations) to observe or disseminate information about stock trading activities.
  • iterative DNS query - An iterative DNS query is a request for a website name or uniform resource locator (URL) that the domain name system (DNS) server responds to with the IP address from its zone file cache, if possible.
  • ITU X.225 (ISO 8327) - ITU X.225 (also known as ISO 8327) is a connection-oriented session layer protocol in the Open Systems Interconnection (OSI) model.
  • jitter - Jitter is any deviation in, or displacement of, the signal pulses in a high-frequency digital signal.
  • jumbo frames - A jumbo frame is an Ethernet frame with a payload greater than the standard maximum transmission unit (MTU) of 1,500 bytes.
  • knowledge process outsourcing (KPO) - Knowledge process outsourcing (KPO) is the allocation of relatively high-level tasks to an outside organization or a different group within the same organization.
  • LAN-free backup - LAN-free backup is the process of backing up server data to a centralized storage device rather than moving it across a local-area network (LAN).
  • leaf-spine (leaf-spine architecture) - Leaf-spine is a two-layer network topology composed of leaf switches and spine switches.
  • leaky bucket algorithm - The leaky bucket algorithm is used to implement traffic policing and traffic shaping in Ethernet and cellular data networks.
  • leaky feeder - A leaky feeder is a coaxial cable that has small sections of its copper shielding stripped away to allow radio frequency (RF) signals to escape.
  • LEAP (Lightweight Extensible Authentication Protocol) - LEAP (Lightweight Extensible Authentication Protocol) is a Cisco-proprietary version of EAP, the authentication protocol used in wireless networks and Point-to-Point connections.
  • leased line - A leased line is a bidirectional telephone line that has been rented for private voice, data exchange or telecommunication use.
  • LiFi - LiFi is a wireless optical networking technology that uses light-emitting diodes (LEDs) for data transmission.
  • Link Control Protocol (LCP) - In computer networking, Point-to-Point Protocol (PPP) provides a standard way to transport multiprotocol data over point-to-point links; within PPP, Link Control Protocol (LCP) establishes, configures and tests data link internet connections.
  • link layer discovery protocol (LLDP) - The link layer discovery protocol (LLDP) is an open and extendable part of the Internet protocol suite used in IEEE 802 to advertise a device’s identity and abilities, as well as other devices connected within the same network.
  • load testing - Load testing is the process of subjecting a computer, peripheral, server, network or application to a work level approaching the limits of its specifications.
  • local area network (LAN) - A local area network (LAN) is a group of computers and peripheral devices that share a common communications line or wireless link to a server within a distinct geographic area.
  • local loop - In telephony, a local loop is the wired connection from a telephone company's central office in a locality to its customers' telephones at homes and businesses.
  • log analytics - Log analytics is the assessment of a recorded set of information from one or more events, captured from a computer, network, application operating system (OS) or other IT ecosystem component.
  • logical network - A logical network is one that appears to the user as a single, separate entity although it might in fact be either just a part of a larger network or an entity connecting multiple networks.
  • loopback test - A loopback test is a test in which a signal in sent from a communications device and returned (looped back) to it as a way to determine whether the device is working right or as a way to pin down a failing node in a network.
  • loose coupling - Loose coupling is a method of interconnecting the components in a system or network so that those components, also called elements, depend on each other to the least extent practicable.
  • LoRa Alliance - The LoRa Alliance is an open, non-profit organization dedicated to promoting the interoperability and standardization of low-power wide area network (LPWAN) technologies to drive implementation of the Internet of Things (IoT).
  • low earth orbit (LEO) satellite - A low earth orbit (LEO) satellite is an object, generally an electronic piece of equipment, that circles around the earth at lower altitudes than geosynchronous satellites.
  • LTE (Long-Term Evolution) - LTE (Long-Term Evolution) is a standard for 4G wireless technology that offers increased network capacity and speed for cellphones and other cellular devices compared with 3G.
  • LUN zoning - LUN zoning is a method of configuring SAN fabric to match logical unit numbers (LUNs) to the proper servers.
  • LZW compression - LZW compression is the compression of a file into a smaller file using a table-based lookup algorithm invented by Abraham Lempel, Jacob Ziv, and Terry Welch.
  • machine-to-machine (M2M) - Machine-to-machine, or M2M, is a broad label that can be used to describe any technology that enables networked devices to exchange information and perform actions without the manual assistance of humans.
  • managed file transfer (MFT) - Managed file transfer (MFT) is a type of software used to provide secure internal, external and ad-hoc data transfers through a network.
  • Manchester encoding - In data transmission, Manchester encoding is a form of digital encoding in which data bits are represented by transitions from one logical state to the other.
  • MDI/MDIX (medium-dependent interface/MDI crossover) - MDI/MDIX is a type of Ethernet port connection that uses twisted-pair cabling to link two networked devices.
  • megabits per second (Mbps) - Megabits per second (Mbps) are units of measurement for network bandwidth and throughput.
  • Message Session Relay Protocol (MSRP) - Message Session Relay Protocol (MSRP) is a protocol for exchanging a series of related instant messages across an IP network in the context of a session.
  • Microsoft Assessment and Planning (MAP) Toolkit - Microsoft Assessment and Planning (MAP) Toolkit is a free utility IT can use to determine whether or not its infrastructure is prepared for a migration to a new operating system, server version or cloud-based deployment.
  • Microsoft Azure - Microsoft Azure, formerly known as Windows Azure, is Microsoft's public cloud computing platform.
  • Microsoft Teams - What is Microsoft Teams? Microsoft Teams is cloud-based team collaboration software that is part of the Microsoft 365 and Office 365 suite of applications.
  • MiFi - MiFi is a portable broadband device that allows multiple end users and mobile devices to share a 3G or 4G mobile broadband Internet connection and create an ad-hoc network.
  • MIMO (multiple input, multiple output) - MIMO (multiple input, multiple output) is an antenna technology for wireless communications in which multiple antennas are used at both the source (transmitter) and the destination (receiver).
  • Mininet - Mininet is a software emulator for prototyping a large network on a single machine.
  • MISO (multiple input, single output) - MISO (multiple input, single output) is an antenna technology for wireless communications in which multiple antennas are used at the source (transmitter).
  • mobile collaboration - Mobile collaboration is the use of mobile devices and collaborative apps to allow geographically dispersed people to work together on endeavors ranging from small personal projects to high-profile enterprise teamwork.
  • multi-carrier modulation (MCM) - Multi-carrier modulation (MCM) is a method of transmitting data by splitting it into several components, and sending each of these components over separate carrier signals.
  • Multipath I/O (MPIO) - Multipath I/O (MPIO) is a Microsoft framework designed to mitigate the effects of a host bus adapter (HBA) failure by providing an alternate data path between storage network devices.
  • multipoint control unit (MCU) - A multipoint control unit (MCU) is a type of video conferencing hardware that bridges terminals involved into a multi-point conference system.
  • NACK (NAK, negative acknowledgment, not acknowledged) - NACK, or NAK, an abbreviation for negative acknowledgment or not acknowledged, is a signal used by computers or other devices to indicate that data transmitted over a network was received with errors or was otherwise unreadable.
  • Nagios - Nagios is an open source monitoring system for computer systems.
  • National eGovernance Plan (NeGP) - National eGovernance Plan (NeGP) is an initiative by the government of India to combine various e-governance systems around the country to create a national network that provides government services to all citizens electronically.
  • NBAR (Network Based Application Recognition) - Network Based Application Recognition (NBAR) is a mechanism that classifies and regulates bandwidth for network applications to ensure that available resources are utilized as efficiently as possible.
  • NBASE-T Ethernet - NBASE-T Ethernet is an IEEE standard and Ethernet-signaling technology that allows existing twisted-pair copper cabling to exceed the cable's specified limit of 1 Gbps for distances of up to 100 meters.
  • NBMA (non-broadcast multiple access) - Non-broadcast multiple access (NBMA) is one of four network types in the Open Shortest Path First (OSPF) communications protocol.
  • NetBIOS (Network Basic Input/Output System) - NetBIOS (Network Basic Input/Output System) is a network service that enables applications on different computers to communicate with each other across a local area network (LAN).
  • network analytics - Network analytics is the application of big data principles and tools to the data used to manage and secure data networks.
  • network convergence - Network convergence is the efficient coexistence of telephone, video and data communication within a single network.
  • network drive - A network drive is a storage device on a local access network (LAN) within a business or home.
  • network fabric - Network fabric is an industry term that describes a network topology in which devices pass data to each other through interconnecting switches.
  • Network File System (NFS) - Network File System (NFS) is a networking protocol for distributed file sharing.
  • Network layer - Located at Layer 3 of the Open Systems Interconnection (OSI) communications model, the primary function of the network layer is to move data into and through other networks.
  • Network Load Balancing (NLB) - Network Load Balancing is a Windows Server feature that can distribute network traffic among multiple servers.
  • network node - A computer network is a system of computers and computing devices that are connected via communication links.
  • network operations center (NOC) - A network operations center (NOC) is a centralized place from which enterprise information technology (IT) administrators -- either internal or third party -- supervise, monitor and maintain a telecommunications network.
  • network orchestration - Network orchestration is a policy-driven approach to network automation that coordinates the hardware and software components a software application or service requires to run.
  • network packet - A network packet is a small amount of data sent over Transmission Control Protocol/Internet Protocol (TCP/IP) networks.
  • network protocol - A network protocol is a set of established rules that dictate how to format, transmit and receive data so that computer network devices -- from servers and routers to endpoints -- can communicate, regardless of the differences in their underlying infrastructures, designs or standards.
  • network switch - A network switch is a hardware device that channels incoming data from multiple input ports to a specific output port that will take it toward its intended destination.
  • network topology - A network topology is the physical and logical arrangement of nodes and connections in a network.
  • network traffic - Network traffic, sometimes referred to as data traffic, is the amount of data which moves across a network during any given time.
  • Next Hop Resolution Protocol (NHRP) - Next Hop Resolution Protocol (NHRP) is an automated configuration technology that routes data on a distributed network by discovering the best routing path between endpoints.
  • NFV MANO (network functions virtualization management and orchestration) - NFV MANO (network functions virtualization management and orchestration), also called MANO, is an architectural framework for managing and orchestrating virtualized network functions (VNFs) and other software components.
  • NFVi (network functions virtualization infrastructure) - NFVi (network functions virtualization infrastructure) encompasses all of the networking hardware and software needed to support and connect virtual network functions in carrier networks.
  • northbound interface / southbound interface - A northbound interface is an interface that allows a particular component of a network to communicate with a higher-level component.
  • NVGRE (Network Virtualization using Generic Routing Encapsulation) - NVGRE (Network Virtualization using Generic Routing Encapsulation) is a network virtualization method that uses encapsulation to create large numbers of virtual LANs (VLANs) for subnets that can extend across dispersed data centers and Layers 2 and 3.
  • OAuth - OAuth (Open Authorization) is an open standard authorization framework for token-based authorization on the internet.
  • OF-Config (OpenFlow Configuration and Management Protocol) - The OpenFlow Management and Configuration Protocol (OF-Config) is a protocol developed under the Open Networking Foundation used to manage physical and virtual switches in an OpenFlow environment.
  • OFDMA (orthogonal frequency-division multiple access) - Orthogonal frequency-division multiple access (OFDMA) is a feature of Wi-Fi 6 (802.
  • omnidirectional antenna - An omnidirectional antenna is a wireless transmitting or receiving antenna that radiates or intercepts radio-frequency (RF) electromagnetic fields equally well in all horizontal directions in a flat, two-dimensional (2D) geometric plane.
  • ONC (Office of the National Coordinator for Health Information Technology) - The Office of the National Coordinator for Health Information Technology, abbreviated ONC, is an entity within the U.
  • ONOS (Open Network Operating System) - ONOS (Open Network Operating System) is an operating system (OS) designed for network service providers to help build carrier-grade software-defined networks architected for high scalability, availability and performance.
  • Open Grid Services Architecture (OGSA) - The Open Grid Services Architecture (OGSA) is a set of standards defining the way in which information is shared among diverse components of large, heterogeneous grid systems.
  • Open Network Automation Platform - The Open Network Automation Platform (ONAP) is a networking project that provides a digital environment for the orchestration and automation of complex network services.
  • OpenFlow controller - An OpenFlow controller is an application that manages flow control in a software-defined networking (SDN) environment.
  • OpenFlow switch - An OpenFlow switch is a software program or hardware device that forwards packets in a software-defined networking (SDN) environment.
SearchNetworking
  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

  • overlay network

    An overlay network is a virtual or logical network that is created on top of an existing physical network.

SearchSecurity
  • encryption

    Encryption is the method by which information is converted into secret code that hides the information's true meaning.

  • X.509 certificate

    An X.509 certificate is a digital certificate that uses the widely accepted international X.509 public key infrastructure (PKI) ...

  • directory traversal

    Directory traversal is a type of HTTP exploit in which a hacker uses the software on a web server to access data in a directory ...

SearchCIO
  • security audit

    A security audit is a systematic evaluation of the security of a company's information system by measuring how well it conforms ...

  • chief transformation officer (CTO)

    Chief transformation officer is an executive role, often in the C-suite, that focuses on bringing about change as well as growth ...

  • data latency

    Data latency is the time it takes for data packets to be stored or retrieved. In business intelligence (BI), data latency is how ...

SearchHRSoftware
SearchCustomerExperience
  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

  • customer intelligence (CI)

    Customer intelligence (CI) is the process of collecting and analyzing detailed customer data from internal and external sources ...

Close