Browse Definitions:

SearchNetworking

IT professionals in almost every industry rely on SearchNetworking.com for industry news, technical tips and valuable best practices on routing, switching, network security, network/systems management, convergence/VoIP and wireless LANs, so they can keep their networks up to date and cope with constant change. Whether you are looking for advice on implementing a new technology or seeking new cost-saving strategies to improve the performance of your current network, SearchNetworking.com is an online helpdesk for IT managers and administrators.

View the complete archive of Enterprise Networking Technology Management news, research and expert advice.

Go to:  SearchNetworking

Recently on  SearchNetworking

Cumulus NOS, Edgecore switch bundle unlikely to beat incumbent vendors

Analysts are skeptical of networking supplier Cumulus's entry into the hardware business. The vendor is selling and supporting an Edgecore switch with the open Cumulus NOS.

More Highlights
Definitions
  • system administrator (sysadmin)

    A system administrator, or sysadmin, needs a variety of skills to manage, configure and provision IT systems that include servers, hardware and software.

  • computer network

    In information technology, a computer network, also called a data network, is a series of points, or nodes, interconnected by communication paths for the purpose of transmitting, receiving and exchanging data, voice and video traffic.

  • wavelength

    A wavelength is a measure of distance between two identical peaks (high points) or troughs (low points) in a wave -- a repeating pattern of traveling energy like light or sound.

Browse Networking Topics

Data Center

Learn about data center networking considerations, including evolving data center network architectures and components, emerging data center network protocols and standards, and converged data center and storage networks.

Recent Definitions

  • Internet of Things (IoT)

    The Internet of Things (IoT) is an environment in which objects, animals or people are assigned unique identifiers and given the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.

  • leaf-spine (leaf-spine architecture)

    Leaf-spine is a two-layer data center network topology that's useful for data centers that experience more east-west network traffic than north-south traffic. The topology is composed of leaf switches (to which servers and storage connect) and spine switches (to which leaf switches connect). Leaf switches mesh into the spine, forming the access layer that delivers network connection points for servers.

  • application delivery controller

    An application delivery controller (ADC) is a network device that manages client connections to complex Web and enterprise applications. In general, a controller is a hardware device or a software program that manages or directs the flow of data between two entities.

Highlights

More Data Center Topics

Back to Top

Administration

Find general information and resources for network administration, including local area network (LAN) administration and Windows and Linux networking. Learn about the OSI Model and Cisco certifications as well as general career information and case studies. You'll also find our library of networking book chapter excerpts and tutorials on various networking topics.

Recent Definitions

  • wavelength

    A wavelength is a measure of distance between two identical peaks (high points) or troughs (low points) in a wave -- a repeating pattern of traveling energy like light or sound.

  • CCNA (Cisco Certified Network Associate) certification

    Cisco Certified Network Associaten (CCNA) is an entry-level certification for the Cisco certified professional program.

  • router

    In packet-switched networks such as the Internet, a router is a device or, in some cases, software in a computer, that determines the next network point to which a packet should be forwarded toward its destination. (Continued...)

Highlights

More Administration Topics

Back to Top

Infrastructure

Advancements in enterprise hardware and network protocols are allowing network pros to take advantage of new technologies to design and implement logical and physical LANs that contribute to business success. In our network infrastructure section, find out what you need to know to design your enterprise local area network infrastructure, including 10/100/100 Ethernet and switching technology, green networking initiatives, PoE, VLANs, and information on IP addressing, subnetting, TCP/IP and network routing protocols.

Recent Definitions

  • system administrator (sysadmin)

    A system administrator, or sysadmin, needs a variety of skills to manage, configure and provision IT systems that include servers, hardware and software.

  • acoustical mesh network

    An acoustical mesh network is a decentralized communication system that transmits data by using sound to connect computers. There are both legitimate and unscrupulous uses for acoustical mesh networks.

  • computer network

    In information technology, a computer network, also called a data network, is a series of points, or nodes, interconnected by communication paths for the purpose of transmitting, receiving and exchanging data, voice and video traffic.

Highlights

More Infrastructure Topics

Back to Top

Network Mgmt

Our network management resources provide you with information on end-to-end network performance, network monitoring, configuration management and applications management. You'll find advice on how to select the best network management software and how to integrate management tools with your network environment.

Recent Definitions

  • von Neumann bottleneck

    The von Neumann bottleneck is a limitation on throughput caused by the standard personal computer architecture.

  • latency

    In a computer system, latency usually refers to any delay or waiting that causes noticeable increases of real or perceived response time. Read our definition of latency for more information about network latency, computer latency, Internet latency and other types, the issues they cause and what you can do about them.

  • trunk

    A trunk is a physical path or link in a communications system that interconnects major switching centers or nodes and is designed to handle many transmissions simultaneously.

Highlights

More Network Mgmt Topics

Back to Top

Network Security

Here you'll find network security resources for selecting and implementing security devices and maintaining secure networks. Find out how to design a secure network perimeter, where to locate a firewall and whether you need network access control.

Recent Definitions

  • pervasive computing (ubiquitous computing)

    Pervasive computing (ubiquitous computing) is the growing trend of embedding computational capability into everyday objects to enable them to communicate and perform useful tasks.

  • gateway

    A gateway is a network device that provides an interface to another network that uses a different protocol and that all data must pass through to use its routing paths.

  • tablet (tablet PC)

    A tablet is a wireless, portable personal computer with a touchscreen interface. The tablet form factor is typically smaller than a notebook computer, but larger than a smartphone.

Highlights

More Network Security Topics

Back to Top

Virtualization

Virtualization is becoming less a buzzword and more just the way things are done, so networking professionals must be aware of the challenges (and benefits) virtualization presents for network configuration, performance and management. Get up to speed on the various types of virtualization such as server virtualization and storage virtualization; find out virtualization's effects on network performance. Find out how to transition to a virtualized environment and the best tools for managing network relationships between VMs and between virtual and physical devices in this section.

Recent Definitions

  • logical unit number (LUN)

    A logical unit number (LUN) identifies one or more physical or virtual storage devices to a SCSI initiator in a host server to enable data exchange.

  • NVGRE (Network Virtualization using Generic Routing Encapsulation)

    NVGRE (Network Virtualization using Generic Routing Encapsulation) is a network virtualization method that uses encapsulation to create large numbers of virtual LANs (VLANs) for subnets that can extend across dispersed data centers and Layers 2 and 3.

  • SDN controller (software-defined networking controller)

    An SDN controller is an application in software-defined networking (SDN) that manages flow control to enable intelligent networking. SDN controllers are based on protocols, such as OpenFlow, that allow servers to tell switches where to send packets.

Highlights

More Virtualization Topics

Back to Top

WLANs

Wireless networking technology is ever-increasing in enterprise IT infrastructure. For information on what products you need to set up a wireless local area network (WLAN), navigate this WLAN section to answer your questions on wireless security encryption, equipment implementation, and wireless protocols and standards (like 802.11n). We also cover wireless network management tools that aid you in troubleshooting Wi-Fi problems.

Recent Definitions

  • acoustical mesh network

    An acoustical mesh network is a decentralized communication system that transmits data by using sound to connect computers. There are both legitimate and unscrupulous uses for acoustical mesh networks.

  • omnidirectional antenna

    An omnidirectional antenna is a wireless transmitting or receiving antenna that radiates or intercepts radio-frequency (RF) electromagnetic fields equally well in all horizontal directions in a flat, two-dimensional (2D) geometric plane.

  • pervasive computing (ubiquitous computing)

    Pervasive computing (ubiquitous computing) is the growing trend of embedding computational capability into everyday objects to enable them to communicate and perform useful tasks.

Highlights

More WLANs Topics

Back to Top

-ADS BY GOOGLE

SearchCompliance

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

  • conduct risk

    Conduct risk is the prospect of financial loss to an organization that is caused by the actions of an organization's ...

SearchSecurity

  • application whitelisting

    Application whitelisting is the practice of identifying applications that have been deemed safe for execution and restricting all...

  • security

    Security, in information technology (IT), is the defense of digital information and IT assets against internal and external, ...

  • insider threat

    An insider threat is a malicious hacker (also called a cracker or a black hat) who is an employee or officer of a business, ...

SearchHealthIT

  • HIPAA Privacy Rule

    The Standards for Privacy of Individually Identifiable Health Information, commonly known as the HIPAA Privacy Rule, establishes ...

  • HIPAA business associate agreement (BAA)

    Under the U.S. Health Insurance Portability and Accountability Act of 1996, a HIPAA business associate agreement (BAA) is a ...

  • telemedicine

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

SearchDisasterRecovery

  • data recovery

    Data recovery restores data that has been lost, accidentally deleted, corrupted or made inaccessible. Learn how data recovery ...

  • disaster recovery plan (DRP)

    A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation ...

  • fault-tolerant

    Systems with integrated fault tolerance are designed to withstand multiple hardware failures to ensure continuous availability.

SearchStorage

  • data deduplication

    Deduplication retains one unique data instance to reduce storage and bandwidth consumed by remote backups, replication and ...

  • byte

    In most computer systems, a byte is a unit of data that is eight binary digits long. Bytes are often used to represent a ...

  • Secure Digital card (SD card)

    SD cards use flash memory to provide nonvolatile storage. They are more rugged than traditional storage media and are used in ...

SearchSolidStateStorage

  • flash file system

    Flash file systems are designed specifically for memory devices. A well-designed flash device and flash file system ensure ...

  • IOPS (input/output operations per second)

    IOPS measures the maximum number of reads and writes to non-contiguous storage. It is not an actual benchmark since vendor ...

  • eMMC (embedded MultiMediaCard)

    An embedded MultiMediaCard (eMMC) is a small storage device made up of NAND flash memory and a simple storage controller.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close