Browse Definitions:

SearchNetworking

IT professionals in almost every industry rely on SearchNetworking.com for industry news, technical tips and valuable best practices on routing, switching, network security, network/systems management, convergence/VoIP and wireless LANs, so they can keep their networks up to date and cope with constant change. Whether you are looking for advice on implementing a new technology or seeking new cost-saving strategies to improve the performance of your current network, SearchNetworking.com is an online helpdesk for IT managers and administrators.

View the complete archive of Enterprise Networking Technology Management news, research and expert advice.

Go to:  SearchNetworking

Recently on  SearchNetworking

SaaS SIEM offers enterprise networks refined analytics

This week, bloggers explore SaaS SIEM, applications as drivers of hybrid cloud, and the benefits and drawbacks of integrated systems.

More Highlights
Definitions
  • ingress filtering

    Ingress filtering is a method used by enterprises and internet service providers (ISPs) to prevent suspicious traffic from entering a network.

  • Cisco Certified Internetwork Expert (CCIE certification)

    Cisco Certified Internetwork Expert (CCIE certification) is a series of technical certifications for senior networking professionals who design, build, implement, maintain and troubleshoot complex enterprise networking infrastructures.

  • Net Neutrality

    Net neutrality is the principle that data packets on the Internet should be moved impartially, without regard to content, destination or source.

Browse Networking Topics

Data Center

Learn about data center networking considerations, including evolving data center network architectures and components, emerging data center network protocols and standards, and converged data center and storage networks.

Recent Definitions

  • Facebook Live

    Facebook Live is a feature for live broadcast of user videos from the Facebook mobile app.

  • top-of-rack switching

    Top-of-rack switching refers to a distributed data center architecture where one or more Ethernet switches is installed in a rack, then uplinked using high-bandwidth fiber optic connections to a central, high-density distribution point.

  • adaptive routing (dynamic routing)

    Adaptive routing, also called dynamic routing, is a process for determining the optimal path a data packet should follow through a network to arrive at a specific destination. Adaptive routing can be compared to a commuter taking a different route to work after learning that traffic on his usual route is backed up.

Highlights

More Data Center Topics

Back to Top

Administration

Find general information and resources for network administration, including local area network (LAN) administration and Windows and Linux networking. Learn about the OSI Model and Cisco certifications as well as general career information and case studies. You'll also find our library of networking book chapter excerpts and tutorials on various networking topics.

Recent Definitions

  • Facebook M

    Facebook M is the social media company’s personal digital assistant for the Messenger mobile app.

  • infrared radiation (IR)

    Infrared radiation (IR), sometimes referred to simply as infrared, is a region of the electromagnetic radiation spectrum where wavelengths range from about 700 nanometers (nm) to 1 millimeter (mm).

  • Mbps (megabits per second)

    Megabits per second (Mbps) are a unit of measurement for bandwidth and throughput on a network. Each megabit is equal to 1 million bits.

Highlights

More Administration Topics

Back to Top

Infrastructure

Advancements in enterprise hardware and network protocols are allowing network pros to take advantage of new technologies to design and implement logical and physical LANs that contribute to business success. In our network infrastructure section, find out what you need to know to design your enterprise local area network infrastructure, including 10/100/100 Ethernet and switching technology, green networking initiatives, PoE, VLANs, and information on IP addressing, subnetting, TCP/IP and network routing protocols.

Recent Definitions

  • codec

    A codec is either a hardware device or a software-based process that compresses and decompresses large amounts of data used in voice over IP, video conferencing and streaming media.

  • ingress filtering

    Ingress filtering is a method used by enterprises and internet service providers (ISPs) to prevent suspicious traffic from entering a network.

  • Unshielded Twisted Pair (UTP)

    Unshielded twisted pair (UTP) is a ubiquitous type of copper cabling used in telephone wiring and local area networks (LANs).

Highlights

More Infrastructure Topics

Back to Top

Network Mgmt

Our network management resources provide you with information on end-to-end network performance, network monitoring, configuration management and applications management. You'll find advice on how to select the best network management software and how to integrate management tools with your network environment.

Recent Definitions

  • bad neighborhood

    A bad neighborhood, in an SEO context, is a group of linked websites with poor reputations and search rankings.

  • ingress filtering

    Ingress filtering is a method used by enterprises and internet service providers (ISPs) to prevent suspicious traffic from entering a network.

  • Cisco Certified Internetwork Expert (CCIE certification)

    Cisco Certified Internetwork Expert (CCIE certification) is a series of technical certifications for senior networking professionals who design, build, implement, maintain and troubleshoot complex enterprise networking infrastructures.

Highlights

More Network Mgmt Topics

Back to Top

Network Security

Here you'll find network security resources for selecting and implementing security devices and maintaining secure networks. Find out how to design a secure network perimeter, where to locate a firewall and whether you need network access control.

Recent Definitions

  • pervasive computing (ubiquitous computing)

    Pervasive computing (ubiquitous computing) is the growing trend of embedding computational capability into everyday objects to enable them to communicate and perform useful tasks.

  • gateway

    A gateway is a network node that connects two networks using different protocols together. While a bridge is used to join two similar types of networks, a gateway is used to join two dissimilar networks.

  • tablet (tablet PC)

    A tablet is a wireless, portable personal computer with a touchscreen interface. The tablet form factor is typically smaller than a notebook computer, but larger than a smartphone.

Highlights

More Network Security Topics

Back to Top

Virtualization

Virtualization is becoming less a buzzword and more just the way things are done, so networking professionals must be aware of the challenges (and benefits) virtualization presents for network configuration, performance and management. Get up to speed on the various types of virtualization such as server virtualization and storage virtualization; find out virtualization's effects on network performance. Find out how to transition to a virtualized environment and the best tools for managing network relationships between VMs and between virtual and physical devices in this section.

Recent Definitions

  • logical unit number (LUN)

    A logical unit number (LUN) identifies one or more physical or virtual storage devices to a SCSI initiator in a host server to enable data exchange.

  • NVGRE (Network Virtualization using Generic Routing Encapsulation)

    NVGRE (Network Virtualization using Generic Routing Encapsulation) is a network virtualization method that uses encapsulation to create large numbers of virtual LANs (VLANs) for subnets that can extend across dispersed data centers and Layers 2 and 3.

  • SDN controller (software-defined networking controller)

    An SDN controller is an application in software-defined networking (SDN) that manages flow control to enable intelligent networking. SDN controllers are based on protocols, such as OpenFlow, that allow servers to tell switches where to send packets.

Highlights

More Virtualization Topics

Back to Top

WLANs

Wireless networking technology is ever-increasing in enterprise IT infrastructure. For information on what products you need to set up a wireless local area network (WLAN), navigate this WLAN section to answer your questions on wireless security encryption, equipment implementation, and wireless protocols and standards (like 802.11n). We also cover wireless network management tools that aid you in troubleshooting Wi-Fi problems.

Recent Definitions

  • radio frequency (RF, rf)

    Radio frequency is a measurement representing the oscillation rate of electromagnetic radiation spectrum, or electromagnetic radio waves, from frequencies ranging from 300 GHz to as low as 9 kHz.

  • line of sight (LOS)

    The level of obstruction in a line of sight determines not only the visibility from one point to another but also the quality of signal reception for wireless transmissions, such as Wi-Fi.

  • telematics

    Telematics uses GPS and mobile devices to send and receive information that helps control remote objects, primarily in the automotive industry.

Highlights

More WLANs Topics

Back to Top

-ADS BY GOOGLE

SearchCompliance

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

SearchSecurity

  • computer worm

    A computer worm is a type of malicious software program whose primary function is to infect other computers while remaining ...

  • black hat

    Black hat refers to a hacker who breaks into a computer system or network with malicious intent.

  • copyright

    Copyright is a legal term describing ownership of control of the rights to the use and distribution of certain works of creative ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.

SearchStorage

  • non-volatile memory (NVM)

    Non-volatile memory (NVMe) is a semiconductor technology that does not require a continuous power supply to retain the data or ...

  • hybrid hard drive (HHD)

    A hybrid hard drive (HHD), sometimes known as a solid-state hybrid drive (SSHD), is a mass storage device that combines a ...

  • USB flash drive

    A USB flash drive -- also known as a stick, thumb or pen drive -- is a plug-and-play portable storage device that uses flash ...

SearchSolidStateStorage

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close