Browse Definitions :

Local area networks (LAN, campus LAN)

Terms related to local area networks (LANs), including definitions about Ethernet and words and phrases about devices that share a common communications line or link.

40 - WSN

  • 40 Gigabit Ethernet (40GbE) - 40 Gigabit Ethernet (40GbE) is a standard that enables the transfer of Ethernet frames at speeds of up to 40 gigabits per second (Gbps).
  • 802.11h - The 802.11h specification is an addition to the 802.
  • Apple Bonjour - Apple Bonjour is a group of networking technologies designed to help devices and applications discover each other on the same network.
  • bandwidth (network bandwidth) - Network bandwidth is a measurement indicating the maximum capacity of a wired or wireless communications link to transmit data over a network connection in a given amount of time.
  • beamforming - Beamforming is a type of RF (radio frequency) management in which an access point uses multiple antennas to send out the same signal.
  • CPE device - A CPE device is telecommunications hardware located at the home or business of a customer.
  • Dynamic Source Routing (DSR) - Dynamic Source Routing (DSR) is a self-maintaining routing protocol for wireless networks.
  • dynamic spectrum access (dynamic spectrum management) - Dynamic spectrum access (DSA), also referred to as dynamic spectrum management (DSM), is a set of spectrum utilization techniques that adjusts frequency in real time based on fluctuating circumstances.
  • interconnection - Interconnection is a strategy for ensuring that businesses can privately, securely and directly exchange digital information.
  • IP surveillance - IP surveillance is a digitized and networked version of closed-circuit television (CCTV).
  • LAN-free backup - LAN-free backup is the process of backing up server data to a centralized storage device rather than moving it across a local-area network (LAN).
  • LEAP (Lightweight Extensible Authentication Protocol) - LEAP (Lightweight Extensible Authentication Protocol) is a Cisco-proprietary version of EAP, the authentication protocol used in wireless networks and Point-to-Point connections.
  • logical network - A logical network is one that appears to the user as a single, separate entity although it might in fact be either just a part of a larger network or an entity connecting multiple networks.
  • managed file transfer (MFT) - Managed file transfer (MFT) is a type of software used to provide secure internal, external and ad-hoc data transfers through a network.
  • Metro Ethernet - Metro Ethernet is the use of Carrier Ethernet technology in metropolitan area networks (MANs).
  • Microsoft Assessment and Planning (MAP) Toolkit - Microsoft Assessment and Planning (MAP) Toolkit is a free utility IT can use to determine whether or not its infrastructure is prepared for a migration to a new operating system, server version or cloud-based deployment.
  • MOSPF (Multicast Open Shortest Path First) - MOSPF (Multicast Open Shortest Path First) is an extension to the OSPF (Open Shortest Path First) protocol that facilitates interoperation between unicast and multicast routers.
  • network automation - Network automation is a methodology in which software automatically configures, provisions, manages and tests network devices.
  • network drive - A network drive is a storage device on a local access network (LAN) within a business or home.
  • piggybacking - Piggybacking, in a wireless communications context, is the unauthorized use of a wireless LAN.
  • Port Address Translation (PAT) - Port Address Translation (PAT), is an extension to network address translation (NAT) that permits multiple devices on a local area network (LAN) to be mapped to a single public IP address.
  • virtual network adapter - A virtual network adapter is a program (instead of a physical network adapter) that allows a computer to connect to a network.
  • VLAN hopping (virtual local area network hopping) - VLAN hopping (virtual local area network hopping) is a method of attacking a network by sending packets to a port at a network end point that is not normally accessible to the sender.
  • VXLAN (Virtual Extensible LAN) - Virtual Extensible LAN (VXLAN) is a proposed Layer 3 encapsulation protocol that will make it easier for network engineers to scale out a cloud computing environment while logically isolating cloud apps and tenants.
  • WAN (wide area network) - A wide area network (WAN) is a geographically distributed telecommunications network that interconnects multiple local area networks (LANs).
  • white space device (WSD) - A white space device is an FCC-certified wireless device that can be used without an exclusive broadcast license in the RF spectrum below 700 MHz: underutilized, unlicensed portions of the spectrum called white space.
  • wireless ad hoc network (WANET) - A wireless ad hoc network (WANET) is a type of local area network (LAN) that is built spontaneously to enable two or more wireless devices to be connected to each other without requiring typical network infrastructure equipment, such as a wireless router or access point.
  • wireless distribution system (WDS) - A wireless distribution system (WDS) is a method of interconnecting access points (AP) in a wireless local area network (WLAN).
  • wireless router - A wireless router is a device in a WLAN (wireless local area network) that determines the next network point to which a packet should be forwarded toward its destination.
  • wireline communication - Wireline communication (also known as wired communication) is the transmission of information over a physical filament.
  • wsname - WSName, or Workstation Name Changer, is a freeware utility that automates the process of computer renaming.
SearchCompliance
  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

SearchSecurity
  • threat modeling

    Threat modeling is a procedure for optimizing application, system or business process security by identifying objectives and ...

  • social engineering

    Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into ...

  • distributed denial-of-service (DDoS) attack

    A distributed denial-of-service (DDoS) attack is one in which multiple compromised computer systems attack a target, such as a ...

SearchHealthIT
SearchDisasterRecovery
  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

SearchStorage
  • storage security

    Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted ...

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud data management

    Cloud data management is a way to manage data across cloud platforms, either with or instead of on-premises storage.

Close