-
-
- route poisoning
- Route poisoning is a method of preventing a net...
- Routing Information Protocol
- RIP (Routing Informat...
- Routing Information Protocol (RIP)
- RIP (Rout...
- routing table
- A routing table is a set of rules, often viewed in ...
- roving analysis port
- Port mirroring, also known as a rovin...
- RPC
- Remote Procedure Call (RPC) is a protocol that one program can use to r...
- RPR
- Resilient Packet Ring (RPR) is a network topology being developed as a ...
- RSAT (Microsoft Remote Server Administration To...
- RSVP
- RSVP (Resource Reservation Protocol) is a set of communication rules ...
- RSVP (Resource Reservation Protocol)
- RSVP ...
- RTP
- The Real-Time Transport Protocol (RTP) is an Internet protocol standard...
- run book
- In a computer system or network, a run book is a written set ...
- runbook
- In a computer system or network, a run book is a written set of...
- running disparity
- Running disparity (RD or rd) is the differe...
- running disparity (RD)
- Running disparity (RD or rd) is t...
- RWU
- Remote wakeup (RWU) is a general term for the powering-up of (turning o...
- SAN file system
- A SAN file system (that is, a storage area netw...
- SAN routing
- SAN (storage area network) routing is a technology used...
- SAR
- In a packet-switched telecommunication network, segmentation and reasse...
- SBC
- A session border controller (SBC) is a device or application that gover...
- SCCP
- Skinny Client Control Protocol (SCCP) is a Cisco proprietary standard...
- SDLC
- (SDLC is also an abbreviation for systems development life cycle.
- SDLC (Synchronous Data Link Control)
- (SDLC...
- SDN application (software-defined networking ap...
- SDN controller (software-defined networking con...
- Secure Shell
- Secure Shell (SSH), sometimes known as Secure Socket ...
- Secure Shell (SSH)
- Secure Shell (SSH), sometimes known as Se...
- Secure Socket Shell
- Secure Shell (SSH), sometimes known as ...
- security ID
- In Windows NT and 2000 operating systems, the security ...
- security identifier
- In Windows NT and 2000 operating system...
- security identifier (SID)
- In Windows NT and 2000 oper...
- security information management
- Security inform...
- security information management (SIM)
- Sec...
- segmentation
- In a packet-switched telecommunication network, segme...
- segmentation and reassembly
- In a packet-switched te...
- segmentation and reassembly (SAR)
- In a packet...
- Sequenced Packet Exchange
- SPX (Sequenced Packet Excha...
- Sequenced Packet Exchange (SPX)
- SPX (Sequenced ...
- server
- In information technology, a server is a computer program that pr...
- server consolidation
- Server consolidation is an approach t...
- Server Core
- Server Core is a bare-bones installation option for com...
- Server Message Block Protocol
- The Server Message ...
- Server Message Block Protocol (SMB protocol)
- server push
- Push (or "server-push") is the delivery of information ...
- server sprawl
- Server sprawl is a situation in which multiple, und...
- server-push
- Push (or "server-push") is the delivery of information ...
- servers
- In information technology, a server is a computer program that ...
- Service Location Protocol
- The Service Location Protoc...
- Service Location Protocol (SLP)
- The Service Loc...
- session border controller
- A session border controller...
- session border controller (SBC)
- A session borde...
- Session Initiation Protocol trunking
- Sessi...
- SFT III
- SFT III is a feature providing fault-tolerance in Intel-based P...
- SID
- In Windows NT and 2000 operating systems, the security identifier (SID)...
- Signaling Transport
- SIGTRAN (for Signaling Transport) is th...
- SIGTRAN
- SIGTRAN (for Signaling Transport) is the standard telephony pro...
- SIGTRAN (Signaling Transport)
- SIGTRAN (for Signal...
- silence suppression
- In Voice over IP (VOiP), voice activati...
- SIM
- Security information management (SIM) is the practice of collecting, mo...
- Simple Network Management Protocol
- Simple Ne...
- Simple Network Management Protocol (SNMP)
- SIP trunking
- Session Initiation Protocol (SIP) trunking is the use...
- SIP trunking (Session Initiation Protocol trunk...
- Skinny Client Control Protocol
- Skinny Client Con...
- Skinny Client Control Protocol (SCCP)
- Ski...
- Skype
- Skype is an Internet telephony service provider that offers free ca...
- SkypeOut
- Skype is an Internet telephony service provider that offers f...
- slave
- In computer networking, master/slave is a model for a communication...
- SLP
- The Service Location Protocol (SLP) is a protocol or method of organizi...
- SMB protocol
- The Server Message Block Protocol (SMB protocol) prov...
- sniffer
- In common industry usage, a sniffer (with lower case "s") is a ...
- sniffer keystroke logger
- A keylogger, sometimes called...
- SNMP
- Simple Network Management Protocol (SNMP) is the protocol governing n...
- sockets
- Sockets is a method for communication between a client program ...
- soft phone
- A softphone (software telephone) is an application progra...
- softphone
- A softphone (software telephone) is an application program ...
- softphone (soft client telephone)
- A softphone...
- software clustering
- Application clustering (sometimes calle...
- software telephone
- A softphone (software telephone) is an ap...
- software-defined data center (SDDC)
- A softw...
- software-defined networking (SDN)
- Software-de...
- software-defined networking monitoring applicat...
- software-defined storage
- Software-defined storage (SDS...
- Source route transparent bridging
- Source-rout...
- Source-route transparent (SRT) bridging
- Source-route transparent bridging
- Source-rout...
- split horizon
- Split horizon is a method of preventing a routing l...
- split-mirror snapshot
- A storage snapshot is a set of refe...
- SPX
- SPX (Sequenced Packet Exchange) is the protocol for handling packet seq...
- SQL Server 2012
- Microsoft SQL Server 2012 is a relational datab...
- Squid proxy server
- Squid is a Unix-based proxy server that c...
- SRT bridging
- Source-route transparent (SRT) bridging is a bridging...
- SSH
- Secure Shell (SSH), sometimes known as Secure Socket Shell, is a UNIX-b...
- storage at the edge
- Storage at the edge is an expression th...
- storage security
- Storage security is the group of parameters a...
- storage snapshot
- A storage snapshot is a set of reference mark...
- storage tunneling
- Fibre Channel over IP (FCIP or FC/IP, also ...
- storage zoning
- In a storage area network (SAN), zoning is the al...