Browse Definitions:

Networking

Definitions about networking including routing and switching vocabulary, telecom terminology, words about email and messaging, mobile and wireless.

Circuit switched services equipment and providers

Terms related to circuit switched services equipment and providers, including dedicated communications channel definitions and words and phrases about telecommunications.

  • trunk

    A trunk is a physical path or link in a communications system that interconnects major switching centers or nodes and is designed to handle many transmissions simultaneously.

  • service-level agreement (SLA)

    A service-level agreement (SLA) is a contract that specifies what the service provider is responsible for.

  • signal-to-noise ratio (S/N or SNR)

    In analog and digital communications, signal-to-noise ratio is a measure of signal strength relative to background noise. This ratio is usually measured in decibels.

View All Circuit switched services equipment and providers Definitions

Data transmission

Terms related to data transmission, including definitions about communication channels and words and phrases about point-to-point and point-to-multipoint data transfers.

  • von Neumann bottleneck

    The von Neumann bottleneck is a limitation on throughput caused by the standard personal computer architecture.

  • trunk

    A trunk is a physical path or link in a communications system that interconnects major switching centers or nodes and is designed to handle many transmissions simultaneously.

  • orthogonal frequency-division multiplexing (OFDM)

    Orthogonal frequency-division multiplexing (OFDM) is a digital modulation method that splits a signal into several narrowband channels carried on different frequencies to reduce interference.

View All Data transmission Definitions Back to Top

Email and messaging

Terms related to email and messaging, including definitions about instant messenger and words and phrases about email servers, storage, spam and mobile access.

  • HipChat

    Atlassian HipChat allows employees to collaborate, work as teams and manage goals, all in real time, whether they work in the same office building or are located around the world.

  • email security gateway

    An email security gateway is a product or service that is designed to prevent the transmission of emails that break company policy, send malware or transfer information with malicious intent.

  • Google+ (Google Plus)

    Google+ (pronounced Google plus) is Google's social networking platform.

View All Email and messaging Definitions Back to Top

High-speed networks

Terms related to high-speed communication networks, including network and end-system architecture definitions and words and phrases about high-bandwidth and low-latency communication.

  • bandwidth

    Definition: Learn what bandwidth is and how the term is used as a synonym for signal frequency range, data transfer rate and capacity.

  • MiFi

    MiFi is a portable broadband device that allows multiple end users and mobile devices to share a 3G or 4G mobile broadband Internet connection and create an ad-hoc network.

  • ternary content-addressable memory (TCAM)

    Ternary content-addressable memory (TCAM) is a specialized type of high-speed memory that searches its entire contents in a single clock cycle, with the term “ternary” referring to its ability to store and query data using three different inputs: 0, 1 and X.

View All High-speed networks Definitions Back to Top

Internet of Things

The Internet of Things (IoT) is a scenario in which objects, animals or people are provided with unique identifiers and the ability to transfer data over a network without requiring human interaction.

  • smart hard hat

    A smart hard hat is personal protective equipment (PPE) designed to enhance worker performance and safety in construction and related industries through embedded technology.

  • embedded system

    An embedded system is some combination of computer hardware and software, either fixed in capability or programmable, that is designed for a specific function or for specific functions within a larger system.

  • fog computing (fog networking, fogging)

    Fog computing, also known as fog networking or fogging, brings the benefits of the cloud closer to where data is created: at the network's edge.

View All Internet of Things Definitions Back to Top

LANs

Terms related to local area networks (LANs), including definitions about Ethernet and words and phrases about devices that share a common communications line or link.

  • network automation

    Network automation is the use of IT controls to supervise and carry out every-day network management functions.

  • 40 Gigabit Ethernet (40GbE)

    40 Gigabit Ethernet (40GbE) is a standard that enables the transfer of Ethernet frames at speeds of up to 40 gigabits per second (Gbps). 40 GbE runs on Quad Small Form Factor Pluggable (QSFFP) cabling, a high-density fiber connector with 12 strands of fiber.

  • network drive

    A network drive is a storage device on a local access network (LAN) within a business or home. Within a business, the network drive is usually located on a server. In a home, the network drive may be located on a dedicated server, one of the networked computers or an external hard drive.

View All LANs Definitions Back to Top

Network hardware

Terms related to network hardware, including definitions about cables or file servers and words and phrases about routers and switches.

  • geo-fencing (geofencing)

    Geo-fencing is a feature in a software program that uses the global positioning system (GPS) or radio frequency identification (RFID) to define geographical boundaries. A geofence is a virtual barrier.

  • network topology

    A network topology is the arrangement of a network, including its nodes and connecting lines. There are two ways of defining network geometry: the physical topology and the logical (or signal) topology.

  • storage snapshot

    A storage snapshot is a set of reference markers for data at a particular point in time.

View All Network hardware Definitions Back to Top

Network software

Terms related to network software, including definitions about network monitoring and words and phrases about network administration.

  • mirror site

    A mirrored site is a website or set of files on a server that has been copied to another server so that the site or files are available from more than one place.

  • IT systems management

    Systems management is the administration of the information technology systems in an enterprise data center. An effective systems management plan facilitates the delivery of IT as a service (ITaaS) and allows the organization's employees to respond to changing business requirements in an agile manner.

  • Remote Procedure Call (RPC)

    Remote Procedure Call (RPC) is a protocol that one program can use to request a service from a program located in another computer on a network without having to understand the network's details.

View All Network software Definitions Back to Top

Networking and communications

Terms related to networking and communications, including definitions about network protocols and words and phrases about data transmission.

  • acoustical mesh network

    An acoustical mesh network is a decentralized communication system that transmits data by using sound to connect computers. There are both legitimate and unscrupulous uses for acoustical mesh networks.

  • fog computing (fog networking, fogging)

    Fog computing, also known as fog networking or fogging, brings the benefits of the cloud closer to where data is created: at the network's edge.

  • omnidirectional antenna

    An omnidirectional antenna is a wireless transmitting or receiving antenna that radiates or intercepts radio-frequency (RF) electromagnetic fields equally well in all horizontal directions in a flat, two-dimensional (2D) geometric plane.

View All Networking and communications Definitions Back to Top

Routing and switching

Terms related to routers and switches, including definitions about hubs and words and phrases about packet-switched networks.

  • recursive DNS server

    A recursive DNS server is a domain name system server that takes website name or URL (uniform resource locator) requests from users and checks the records attained from authoritative DNS servers for the associated IP address.

  • recursive DNS query

    A recursive DNS query is a request from a client for a website that must be responded to with either the sought response or an error message stating that the site does not exist.

  • iterative DNS query

    An iterative DNS query is a request for a website name or uniform resource locator (URL) that the domain name system (DNS) server responds to with the IP address from its zone file cache, if possible.

View All Routing and switching Definitions Back to Top

Smart grid

Terms related to smart grids, including definitions about utility electricity delivery systems and words and phrases about smart meters and distributing, monitoring and billing electrical power.

  • Internet of Things (IoT)

    The Internet of Things (IoT) is an environment in which objects, animals or people are assigned unique identifiers and given the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.

  • WRAN (wireless regional area network)

    A wireless regional area network (WRAN) is techology based on IEEE 802.22 to take advantage of underused white space spectrum and bring high-speed wireless connectivity to rural areas.

  • event-condition-action rule (ECA rule)

    An event condition action rule (ECA rule) is the underlying model for event-driven programming, in which actions are triggered by events, given the existence of specific conditions.

View All Smart grid Definitions Back to Top

Telecom

Terms related to telecom, including definitions about telecommunication service providers and words and phrases about voice, video and Internet communication.

  • cloud services

    Cloud services is an umbrella term that may refer to a variety of resources provided over the internet, or to professional services that support the deployment of such cloud-based resources.

  • landline

    A landline is a telephone that transmits signals converted from audio data through physical media, such as wire or fibre optic cable, rather than through wireless transmission as is the case with mobile phones.

  • personal digital assistant

    Personal digital assistants were the precursors to smartphones. Most PDAs had a small physical keyboard, and many types of applications were written for these devices.

View All Telecom Definitions Back to Top

VoIP

Terms related to voice over IP (VoIP), including definitions about communication protocols and words and phrases about making phone calls over the Internet.

  • VoIP (voice over IP)

    VoIP enables voice and multimedia communications, such as phone calls, over the internet and other IP-based networks, and allows enterprises to operate a single voice and data network.

  • port 9875 (port of doom)

    Port 9875 is a port often associated with setting up VoIP communications.The port is also notorious as an attack vector for the Portal of Doom Trojan; as a result, it is sometimes referred to as the Port of Doom.

  • unified communications (UC)

    Unified communications consists of a broad group of real-time and asynchronous communications tools such as IP telephony, IM, Web conferencing and others that provide collaborative services to end users

View All VoIP Definitions Back to Top

Wireless LANs

Terms related to wireless LANs, including definitions about Wi-Fi and words and phrases about wireless access points, wireless controllers, wireless LAN security and WLAN configuration.

  • Wi-Fi Protected Access (WPA)

    Wi-Fi Protected Access, or WPA, is a security standard for Wi-Fi wireless internet connections that gave way to WPA2 in 2004. WPA2 uses the Counter Mode Cipher Block Chaining Message Authentication Code Protocol and is based on the Advanced Encryption Standard algorithm.

  • virtual private network (VPN)

    A virtual private network creates an encrypted connection over a less secure network when the network infrastructure cannot provide enough security to connected systems.

  • White Space Wi-Fi (White-Fi)

    White space Wi-Fi, also known as White-Fi, specified in IEEE 802.11af: The use of frequencies made available by the absence of analog-to-air TV signals to create Wi-Fi networks with greater range, speed and penetration of obstacles.

View All Wireless LANs Definitions Back to Top

Wireless technologies

Terms related to wireless technologies, including definitions about wireless devices and words and phrases about radio, microwave and infrared communication.

  • acoustical mesh network

    An acoustical mesh network is a decentralized communication system that transmits data by using sound to connect computers. There are both legitimate and unscrupulous uses for acoustical mesh networks.

  • geo-fencing (geofencing)

    Geo-fencing is a feature in a software program that uses the global positioning system (GPS) or radio frequency identification (RFID) to define geographical boundaries. A geofence is a virtual barrier.

  • pervasive computing (ubiquitous computing)

    Pervasive computing (ubiquitous computing) is the growing trend of embedding computational capability into everyday objects to enable them to communicate and perform useful tasks.

View All Wireless technologies Definitions Back to Top

-ADS BY GOOGLE

SearchCompliance

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

  • conduct risk

    Conduct risk is the prospect of financial loss to an organization that is caused by the actions of an organization's ...

SearchSecurity

  • insider threat

    An insider threat is a malicious hacker (also called a cracker or a black hat) who is an employee or officer of a business, ...

  • virus (computer virus)

    A computer virus is malicious code that replicates by copying itself to another program, computer boot sector or document.

  • two-factor authentication (2FA)

    Two-factor authentication (2FA), often referred to as two-step verification, is a security process in which the user provides two...

SearchHealthIT

  • HIPAA Privacy Rule

    The Standards for Privacy of Individually Identifiable Health Information, commonly known as the HIPAA Privacy Rule, establishes ...

  • HIPAA business associate agreement (BAA)

    Under the U.S. Health Insurance Portability and Accountability Act of 1996, a HIPAA business associate agreement (BAA) is a ...

  • telemedicine

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

SearchDisasterRecovery

  • disaster recovery plan (DRP)

    A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation ...

  • fault-tolerant

    Systems with integrated fault tolerance are designed to withstand multiple hardware failures to ensure continuous availability.

  • disaster recovery (DR)

    Disaster recovery strategies are critical, as many businesses fail following an unforeseen event. DR may require an internal or ...

SearchStorage

  • Secure Digital card (SD card)

    SD cards use flash memory to provide nonvolatile storage. They are more rugged than traditional storage media and are used in ...

  • data storage

    In a computer, storage is the place where data is held in an electromagnetic or optical form for access by a computer processor.

  • flash storage

    Flash-based storage, based on flash memory, is used for data repositories, storage systems and consumer devices, such as USB ...

SearchSolidStateStorage

  • flash file system

    Flash file systems are designed specifically for memory devices. A well-designed flash device and flash file system ensure ...

  • IOPS (input/output operations per second)

    IOPS measures the maximum number of reads and writes to non-contiguous storage. It is not an actual benchmark since vendor ...

  • eMMC (embedded MultiMediaCard)

    An embedded MultiMediaCard (eMMC) is a small storage device made up of NAND flash memory and a simple storage controller.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close