Browse Definitions:

SearchNetworking

IT professionals in almost every industry rely on SearchNetworking.com for industry news, technical tips and valuable best practices on routing, switching, network security, network/systems management, convergence/VoIP and wireless LANs, so they can keep their networks up to date and cope with constant change. Whether you are looking for advice on implementing a new technology or seeking new cost-saving strategies to improve the performance of your current network, SearchNetworking.com is an online helpdesk for IT managers and administrators.

View the complete archive of Enterprise Networking Technology Management news, research and expert advice.

Go to:  SearchNetworking

Recently on  SearchNetworking

Aruba launches AI-based user behavioral analytics system

Artificial intelligence and machine learning are key components of the newly launched Aruba 360 Secure Fabric user behavioral analytics security software.

More Highlights
Definitions
  • coaxial cable

    Coaxial cable is a type of copper cable specially built with a metal shield and other components engineered to block signal interference.

  • application delivery controller

    An application delivery controller (ADC) is a network component that manages and optimizes how client machines connect to web and enterprise application servers.

  • TCP/IP (Transmission Control Protocol/Internet Protocol)

    TCP/IP, or the Transmission Control Protocol/Internet Protocol, is a suite of communication protocols used to interconnect network devices on the internet.

Browse Networking Topics

Data Center

Learn about data center networking considerations, including evolving data center network architectures and components, emerging data center network protocols and standards, and converged data center and storage networks.

Recent Definitions

  • application delivery controller

    An application delivery controller (ADC) is a network component that manages and optimizes how client machines connect to web and enterprise application servers.

  • Facebook Live

    Facebook Live is a feature for live broadcast of user videos from the Facebook mobile app.

  • top-of-rack switching

    Top-of-rack switching refers to a distributed data center architecture where one or more Ethernet switches is installed in a rack, then uplinked using high-bandwidth fiber optic connections to a central, high-density distribution point.

Highlights

More Data Center Topics

Back to Top

Administration

Find general information and resources for network administration, including local area network (LAN) administration and Windows and Linux networking. Learn about the OSI Model and Cisco certifications as well as general career information and case studies. You'll also find our library of networking book chapter excerpts and tutorials on various networking topics.

Recent Definitions

  • TCP/IP (Transmission Control Protocol/Internet Protocol)

    TCP/IP, or the Transmission Control Protocol/Internet Protocol, is a suite of communication protocols used to interconnect network devices on the internet.

  • network hub

    A network hub is a node that broadcasts data to every computer or Ethernet-based device connected to it.

  • Facebook M

    Facebook M is the social media company’s personal digital assistant for the Messenger mobile app.

Highlights

More Administration Topics

Back to Top

Infrastructure

Advancements in enterprise hardware and network protocols are allowing network pros to take advantage of new technologies to design and implement logical and physical LANs that contribute to business success. In our network infrastructure section, find out what you need to know to design your enterprise local area network infrastructure, including 10/100/100 Ethernet and switching technology, green networking initiatives, PoE, VLANs, and information on IP addressing, subnetting, TCP/IP and network routing protocols.

Recent Definitions

  • coaxial cable

    Coaxial cable is a type of copper cable specially built with a metal shield and other components engineered to block signal interference.

  • application delivery controller

    An application delivery controller (ADC) is a network component that manages and optimizes how client machines connect to web and enterprise application servers.

  • TCP/IP (Transmission Control Protocol/Internet Protocol)

    TCP/IP, or the Transmission Control Protocol/Internet Protocol, is a suite of communication protocols used to interconnect network devices on the internet.

Highlights

More Infrastructure Topics

Back to Top

Network Mgmt

Our network management resources provide you with information on end-to-end network performance, network monitoring, configuration management and applications management. You'll find advice on how to select the best network management software and how to integrate management tools with your network environment.

Recent Definitions

  • TCP/IP (Transmission Control Protocol/Internet Protocol)

    TCP/IP, or the Transmission Control Protocol/Internet Protocol, is a suite of communication protocols used to interconnect network devices on the internet.

  • bad neighborhood

    A bad neighborhood, in an SEO context, is a group of linked websites with poor reputations and search rankings.

  • ingress filtering

    Ingress filtering is a method used by enterprises and internet service providers (ISPs) to prevent suspicious traffic from entering a network.

Highlights

More Network Mgmt Topics

Back to Top

Network Security

Here you'll find network security resources for selecting and implementing security devices and maintaining secure networks. Find out how to design a secure network perimeter, where to locate a firewall and whether you need network access control.

Recent Definitions

  • air gapping (air gap attack)

    Air gapping is a security measure that involves isolating a computer or network and preventing it from establishing an external connection.

  • application delivery controller

    An application delivery controller (ADC) is a network component that manages and optimizes how client machines connect to web and enterprise application servers.

  • pervasive computing (ubiquitous computing)

    Pervasive computing (ubiquitous computing) is the growing trend of embedding computational capability into everyday objects to enable them to communicate and perform useful tasks.

Highlights

More Network Security Topics

Back to Top

Virtualization

Virtualization is becoming less a buzzword and more just the way things are done, so networking professionals must be aware of the challenges (and benefits) virtualization presents for network configuration, performance and management. Get up to speed on the various types of virtualization such as server virtualization and storage virtualization; find out virtualization's effects on network performance. Find out how to transition to a virtualized environment and the best tools for managing network relationships between VMs and between virtual and physical devices in this section.

Recent Definitions

  • logical unit number (LUN)

    A logical unit number (LUN) identifies one or more physical or virtual storage devices to a SCSI initiator in a host server to enable data exchange.

  • NVGRE (Network Virtualization using Generic Routing Encapsulation)

    NVGRE (Network Virtualization using Generic Routing Encapsulation) is a network virtualization method that uses encapsulation to create large numbers of virtual LANs (VLANs) for subnets that can extend across dispersed data centers and Layers 2 and 3.

  • SDN controller (software-defined networking controller)

    An SDN controller is an application in software-defined networking (SDN) that manages flow control to enable intelligent networking. SDN controllers are based on protocols, such as OpenFlow, that allow servers to tell switches where to send packets.

Highlights

More Virtualization Topics

Back to Top

WLANs

Wireless networking technology is ever-increasing in enterprise IT infrastructure. For information on what products you need to set up a wireless local area network (WLAN), navigate this WLAN section to answer your questions on wireless security encryption, equipment implementation, and wireless protocols and standards (like 802.11n). We also cover wireless network management tools that aid you in troubleshooting Wi-Fi problems.

Recent Definitions

  • spectrum analyzer

    A spectrum analyzer is a device that displays signal amplitude (strength) as it varies by signal frequency.

  • radio frequency (RF, rf)

    Radio frequency is a measurement representing the oscillation rate of electromagnetic radiation spectrum, or electromagnetic radio waves, from frequencies ranging from 300 GHz to as low as 9 kHz.

  • line of sight (LOS)

    The level of obstruction in a line of sight determines not only the visibility from one point to another but also the quality of signal reception for wireless transmissions, such as Wi-Fi.

Highlights

More WLANs Topics

Back to Top

-ADS BY GOOGLE

SearchCompliance

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

SearchSecurity

  • insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.

  • ransomware

    Ransomware is a subset of malware in which the data on a victim's computer is locked, typically by encryption, and payment is ...

  • hacker

    A hacker is an individual who uses computer, networking or other skills to overcome a technical problem.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

SearchSolidStateStorage

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close