Browse Definitions:

SearchEnterpriseWAN

IT professionals in almost every industry rely on SearchEnterpriseWAN.com for industry news, technical tips and valuable best practices on designing a Wide Area Network, optimizing application performance across the WAN, WAN Security and VPN usage, or selecting managed services so they can keep their networks up to date and cope with constant change.

View the complete archive of Enterprise WAN Management news, research and expert advice.

Go to:  SearchEnterpriseWAN

Recently on  SearchEnterpriseWAN

How types of noise in data communication systems affect the network

Learn about the different types of noise in data communication -- including thermal, intermodulation, cross-talk, impulse and shot noise -- and how they can affect your network.

More Highlights
  • VPN

    A virtual private network creates an encrypted connection over a less secure network when the network infrastructure cannot provide enough security to connected systems.

  • virtual private network

    A virtual private network creates an encrypted connection over a less secure network when the network infrastructure cannot provide enough security to connected systems.

  • Integrated Services Digital Network

    ISDN (Integrated Services Digital Network) is a set of CCITT/ITU standards for digital transmission over ordinary telephone copper wire, as well as over other media.

Definitions
  • WAN (wide area network)

    A wide area network (WAN) is a geographically distributed telecommunications network that interconnects multiple local area networks (LANs).

  • virtual private network (VPN)

    A virtual private network creates an encrypted connection over a less secure network when the network infrastructure cannot provide enough security to connected systems.

  • ISDN (Integrated Services Digital Network)

    ISDN (Integrated Services Digital Network) is a set of CCITT/ITU standards for digital transmission over ordinary telephone copper wire, as well as over other media.

Browse EnterpriseWAN Topics

Telecom Services

Telecommunication carrier services often make up the largest portion of an enterprise's IT budget, so choosing the right services is critical. The options are many and relationships can be complex, especially when a distributed network spans multiple countries or continents. This section presents the latest on the available choices, including purchasing bandwidth like T1 lines, managed services, and emerging services like SaaS and cloud computing, as well as best practices on how to evaluate the services you're receiving and negotiating with telecom providers.

Recent Definitions

  • WAN (wide area network)

    A wide area network (WAN) is a geographically distributed telecommunications network that interconnects multiple local area networks (LANs).

  • Network Address Translation (NAT)

    A NAT (Network Address Translation or Network Address Translator) is the virtualization of Internet Protocol (IP) addresses.

  • managed service provider (MSP)

    A managed service provider (MSP) is a company that remotely manages a customer's IT infrastructure.

Highlights

More Telecom Services Topics

Back to Top

VPNs/Security

Here you'll find advice and news to help you design, manage and troubleshoot secure VPNs and remote access and to ensure that your WAN is protected from threats that lurk on the Internet or target the applications you're running. Our resources provide information about IPsec and SSL VPN design, setup and configuration, secure remote access, and Web and application security.

Recent Definitions

  • virtual private network (VPN)

    A virtual private network creates an encrypted connection over a less secure network when the network infrastructure cannot provide enough security to connected systems.

  • Network Address Translation (NAT)

    A NAT (Network Address Translation or Network Address Translator) is the virtualization of Internet Protocol (IP) addresses.

  • dynamic multipoint VPN (DMVPN)

    A dynamic multipoint virtual private network (DMVPN) is a secure network that exchanges data between sites without needing to pass traffic through an organization's headquarter VPN server or router.

Highlights

More VPNs/Security Topics

Back to Top

WAN Design

Network design is the basis for every WAN and the most crucial part to get right. Here we cover best practices and strategies for WAN design, including considerations for WAN capacity planning and bandwidth management, branch office network design, network disaster recovery planning methods, WWAN and mesh network planning and VPN design.

Recent Definitions

  • disaster recovery plan (DRP)

    A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation work and testing.

  • frame relay

    Frame relay is an affordable way to transmit switched-packet data within LANs and WANs.

  • bandwidth

    Definition: Learn what bandwidth is and how the term is used as a synonym for signal frequency range, data transfer rate and capacity.

Highlights

More WAN Design Topics

Back to Top

Infrastructure

Equipping your WAN with the right network hardware and technology is essential to providing your users with the connectivity, services and applications they need. Here you'll find resources on WAN network hardware and infrastructure, WAN protocols and IP networking, including IPv6. You'll learn how to build a WAN that meets today's complex networking challenges.

Recent Definitions

  • WAN (wide area network)

    A wide area network (WAN) is a geographically distributed telecommunications network that interconnects multiple local area networks (LANs).

  • ISDN (Integrated Services Digital Network)

    ISDN (Integrated Services Digital Network) is a set of CCITT/ITU standards for digital transmission over ordinary telephone copper wire, as well as over other media.

  • File Transfer Protocol (FTP)

    File Transfer Protocol (FTP) is a client-server standard used to transfer files between computers over the Internet using control and data channels.

Highlights

More Infrastructure Topics

Back to Top

Optimization/Application Performance

WAN optimization can help ensure efficient and fast applications delivery on the network. Learn how WAN optimization and application acceleration can help manage traffic on the WAN, how to understand and manage application performance, how to monitor the WAN to prevent application bottlenecks, and how to manage applications and systems remotely.

Recent Definitions

  • Space Communications Protocol Specifications (SCPS)

    Space Communications Protocol Specifications (SCPS) are designed to improve communications reliability, error checking, efficiency and performance in ground, manned craft and satellite inter-communications.

  • byte caching

    Byte caching is a method of reducing the amount of repetitious data that is sent back and forth in a network as a means of streamlining network performance.

  • leaky bucket algorithm

    The leaky bucket algorithm is used to implement traffic policing and traffic shaping in Ethernet and cellular data networks. The algorithm can also be used to control metered-bandwidth Internet connections to prevent going over the allotted bandwidth for a month, thereby avoiding extra charges.

Highlights

More Optimization/Application Performance Topics

Back to Top

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard, or AES, is a symmetric block cipher used by the U.S. government to protect classified ...

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • spear phishing

    Spear phishing is an email-spoofing attack that targets a specific organization or individual, seeking unauthorized access to ...

SearchHealthIT

SearchDisasterRecovery

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.

  • disaster recovery as a service (DRaaS)

    One approach to a strong disaster recovery plan is DRaaS, where companies offload data replication and restoration ...

SearchStorage

  • ZFS

    ZFS is a local file system and logical volume manager created by Sun Microsystems to control the placement, storage and retrieval...

  • CIFS (Common Internet File System)

    CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an ...

  • GlusterFS (Gluster File System)

    GlusterFS (Gluster File System) is an open source distributed file system that can scale out in building-block fashion to store ...

SearchSolidStateStorage

  • Tier 0

    Tier 0 (tier zero) is a level of data storage that is faster, and perhaps more expensive, than any other level in the storage ...

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • SSD caching

    SSD caching, also known as flash caching, is the temporary storage of data on NAND flash memory chips in a solid-state drive so ...

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close