Browse Definitions :

Local area networks (LAN, campus LAN)

Terms related to local area networks (LANs), including definitions about Ethernet and words and phrases about devices that share a common communications line or link.

40 - WSN

  • 40 Gigabit Ethernet (40GbE) - 40 Gigabit Ethernet (40GbE) is a standard that enables the transfer of Ethernet frames at speeds of up to 40 gigabits per second (Gbps).
  • 802.11h - The 802.11h specification is an addition to the 802.
  • Apple Bonjour - Apple Bonjour is a group of networking technologies designed to help devices and applications discover each other on the same network.
  • beamforming - Beamforming is a type of RF (radio frequency) management in which an access point uses multiple antennas to send out the same signal.
  • CPE device - A CPE device is telecommunications hardware located at the home or business of a customer.
  • Dynamic Source Routing (DSR) - Dynamic Source Routing (DSR) is a self-maintaining routing protocol for wireless networks.
  • dynamic spectrum access (dynamic spectrum management) - Dynamic spectrum access (DSA), also referred to as dynamic spectrum management (DSM), is a set of spectrum utilization techniques that adjusts frequency in real time based on fluctuating circumstances.
  • interconnection - Interconnection is a strategy for ensuring that businesses can privately, securely and directly exchange digital information.
  • IP surveillance - IP surveillance is a digitized and networked version of closed-circuit television (CCTV).
  • LAN-free backup - LAN-free backup is the process of backing up server data to a centralized storage device rather than moving it across a local-area network (LAN).
  • LEAP (Lightweight Extensible Authentication Protocol) - LEAP (Lightweight Extensible Authentication Protocol) is a Cisco-proprietary version of EAP, the authentication protocol used in wireless networks and Point-to-Point connections.
  • logical network - A logical network is one that appears to the user as a single, separate entity although it might in fact be either just a part of a larger network or an entity connecting multiple networks.
  • managed file transfer (MFT) - Managed file transfer (MFT) is a type of software used to provide secure internal, external and ad-hoc data transfers through a network.
  • Mesh Connectivity Layer (MCL) - Mesh Connectivity Layer (MCL) is a technology that allows a computer user to connect to a wireless mesh network that uses Wi-Fi or WiMax.
  • Metro Ethernet - Metro Ethernet is the use of Carrier Ethernet technology in metropolitan area networks (MANs).
  • Microsoft Assessment and Planning (MAP) Toolkit - Microsoft Assessment and Planning (MAP) Toolkit is a free utility IT can use to determine whether or not its infrastructure is prepared for a migration to a new operating system, server version or cloud-based deployment.
  • MOSPF (Multicast Open Shortest Path First) - MOSPF (Multicast Open Shortest Path First) is an extension to the OSPF (Open Shortest Path First) protocol that facilitates interoperation between unicast and multicast routers.
  • network automation - Network automation is a methodology in which software automatically configures, provisions, manages and tests network devices.
  • network drive - A network drive is a storage device on a local access network (LAN) within a business or home.
  • piggybacking - Piggybacking, in a wireless communications context, is the unauthorized use of a wireless LAN.
  • Port Address Translation (PAT) - Port Address Translation (PAT), is an extension to network address translation (NAT) that permits multiple devices on a local area network (LAN) to be mapped to a single public IP address.
  • Top searches of 2008 - What were people searching the WhatIs.
  • virtual network adapter - A virtual network adapter is a program (instead of a physical network adapter) that allows a computer to connect to a network.
  • VLAN hopping (virtual local area network hopping) - VLAN hopping (virtual local area network hopping) is a method of attacking a network by sending packets to a port at a network end point that is not normally accessible to the sender.
  • VXLAN (Virtual Extensible LAN) - Virtual Extensible LAN (VXLAN) is a proposed Layer 3 encapsulation protocol that will make it easier for network engineers to scale out a cloud computing environment while logically isolating cloud apps and tenants.
  • white space device (WSD) - A white space device is an FCC-certified wireless device that can be used without an exclusive broadcast license in the RF spectrum below 700 MHz: underutilized, unlicensed portions of the spectrum called white space.
  • wireless distribution system (WDS) - A wireless distribution system (WDS) is a method of interconnecting access points (AP) in a wireless local area network (WLAN).
  • wireless router - A wireless router is a device in a WLAN (wireless local area network) that determines the next network point to which a packet should be forwarded toward its destination.
  • wireline communication - Wireline communication (also known as wired communication) is the transmission of information over a physical filament.
  • wsname - WSName, or Workstation Name Changer, is a freeware utility that automates the process of computer renaming.

-ADS BY GOOGLE

SearchCompliance

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

SearchSecurity

  • asymmetric cryptography (public key cryptography)

    Asymmetric cryptography, also known as public-key cryptography, is a process that uses a pair of related keys -- one public key ...

  • Evil Corp

    Evil Corp is an international cybercrime network that uses malicious software to steal money from its victims' bank accounts.

  • Plundervolt

    Plundervolt is a method of hacking that involves depriving an Intel chip of power so that processing errors occur.

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks or ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

Close