Browse Definitions :

Local area networks (LAN, campus LAN)

Terms related to local area networks (LANs), including definitions about Ethernet and words and phrases about devices that share a common communications line or link.

100 - WIR

  • 100 Gigabit Ethernet (100 GbE) - 100 Gigabit Ethernet (100 GbE) is an Ethernet standard that supports data speeds of up to 100 billion bits (gigabits) per second (Gbps).
  • 10BASE-T - 10BASE-T is an Ethernet standard for local area networks and one of several physical media specified in the Institute of Electrical and Electronics Engineers (IEEE) 802.
  • 40 Gigabit Ethernet (40GbE) - 40 Gigabit Ethernet (40GbE) is a standard that enables the transfer of Ethernet frames at speeds of up to 40 gigabits per second (Gbps).
  • 802.11h - The 802.11h specification is an addition to the 802.
  • Apple Bonjour - Apple Bonjour is a group of networking technologies designed to help devices and applications discover each other on the same network.
  • bandwidth (network bandwidth) - Network bandwidth is a measurement indicating the maximum capacity of a wired or wireless communications link to transmit data over a network connection in a given amount of time.
  • beamforming - Beamforming is a type of radio frequency (RF) management in which a wireless signal is directed toward a specific receiving device.
  • bus network - A bus network is a local area network (LAN) topology in which each node -- a workstation or other device -- is connected to a main cable or link called a bus.
  • conductance - Conductance is an expression of the ease with which electric current flows through materials like metals and nonmetals.
  • connectionless - In telecommunications, connectionless describes communication between two network endpoints in which a message can be sent from one endpoint to another without prior arrangement.
  • CPE device - A CPE device is telecommunications hardware located at the home or business of a customer.
  • Dynamic Source Routing (DSR) - Dynamic Source Routing (DSR) is a self-maintaining routing protocol for wireless networks.
  • dynamic spectrum access (dynamic spectrum management) - Dynamic spectrum access (DSA), also referred to as dynamic spectrum management (DSM), is a set of spectrum utilization techniques that adjusts frequency in real time based on fluctuating circumstances.
  • FDDI (Fiber Distributed Data Interface) - FDDI (Fiber Distributed Data Interface) is a network standard that uses fiber optic connections in a local area network (LAN) that can extend in range up to 200 kilometers (124 miles).
  • fixed-length subnet mask (FLSM) - A fixed-length subnet mask (FLSM) refers to a type of enterprise or provider networking where a block of IP addresses is divided into multiple subnets of equal length (i.
  • interconnection - Interconnection is a strategy for ensuring that businesses can privately, securely and directly exchange digital information.
  • IP surveillance - IP surveillance is a digitized and networked version of closed-circuit television (CCTV).
  • LAN-free backup - LAN-free backup is the process of backing up server data to a centralized storage device rather than moving it across a local-area network (LAN).
  • LEAP (Lightweight Extensible Authentication Protocol) - LEAP (Lightweight Extensible Authentication Protocol) is a Cisco-proprietary version of EAP, the authentication protocol used in wireless networks and Point-to-Point connections.
  • logical network - A logical network is one that appears to the user as a single, separate entity although it might in fact be either just a part of a larger network or an entity connecting multiple networks.
  • managed file transfer (MFT) - Managed file transfer (MFT) is a type of software used to provide secure internal, external and ad-hoc data transfers through a network.
  • Microsoft Assessment and Planning (MAP) Toolkit - Microsoft Assessment and Planning (MAP) Toolkit is a free utility IT can use to determine whether or not its infrastructure is prepared for a migration to a new operating system, server version or cloud-based deployment.
  • NetBIOS (Network Basic Input/Output System) - NetBIOS (Network Basic Input/Output System) is a network service that enables applications on different computers to communicate with each other across a local area network (LAN).
  • network automation - Network automation is a methodology in which software automatically configures, provisions, manages and tests network devices.
  • network drive - A network drive is a storage device on a local access network (LAN) within a business or home.
  • passive optical network (PON) - A passive optical network (PON) is a system commonly used by telecommunications network providers that brings fiber optic cabling and signals all or most of the way to the end user.
  • piggybacking - Piggybacking, in a wireless communications context, is the unauthorized use of a wireless LAN.
  • ping sweep (ICMP sweep) - A ping sweep (also known as an ICMP sweep) is a basic network scanning technique used to determine which of a range of IP addresses map to live hosts (computers).
  • Port Address Translation (PAT) - Port Address Translation (PAT), is an extension to network address translation (NAT) that permits multiple devices on a local area network (LAN) to be mapped to a single public IP address.
  • port number - Port number is a way to identify a specific process to which an internet or other network message is to be forwarded when it arrives at a server.
  • promiscuous mode - In computer networking, promiscuous mode is a mode of operation, as well as a security, monitoring and administration technique.
  • star network - A star network is a local area network (LAN) topology in which all nodes -- personal computers (PCs), workstations or other devices -- are directly connected to a common central computer that is often referred to as a hub.
  • virtual network adapter - A virtual network adapter is software that operates like a physical network adapter within the host operating system (OS) or through an application installed on the endpoint or server.
  • VLAN hopping (virtual local area network hopping) - VLAN hopping (virtual local area network hopping) is a method of attacking a network by sending packets to a port at a network end point that is not normally accessible to the sender.
  • VXLAN (Virtual Extensible LAN) - Virtual Extensible LAN (VXLAN) is a proposed Layer 3 encapsulation protocol that will make it easier for network engineers to scale out a cloud computing environment while logically isolating cloud apps and tenants.
  • WAN (wide area network) - A wide area network (WAN) is a geographically distributed telecommunications network that interconnects multiple local area networks (LANs).
  • wireless ad hoc network (WANET) - A wireless ad hoc network (WANET) is a type of local area network (LAN) that is built spontaneously to enable two or more wireless devices to be connected to each other without requiring typical network infrastructure equipment, such as a wireless router or access point.
  • wireless distribution system (WDS) - A wireless distribution system (WDS) is a method of interconnecting access points (AP) in a wireless local area network (WLAN).
  • wireless router - A wireless router is a device in a WLAN (wireless local area network) that determines the next network point to which a packet should be forwarded toward its destination.
  • wireline communication - Wireline communication (also known as wired communication) is the transmission of information over a physical filament.
SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • Twofish

    Twofish is a symmetric-key block cipher with a block size of 128 bits and variable-length key of size 128, 192 or 256 bits.

  • walled garden

    On the internet, a walled garden is an environment that controls the user's access to network-based content and services.

  • potentially unwanted program (PUP)

    A potentially unwanted program (PUP) is a program that may be unwanted, despite the possibility that users consented to download ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • Remote Direct Memory Access (RDMA)

    Remote Direct Memory Access (RDMA) is a technology that enables two networked computers to exchange data in main memory without ...

  • storage (computer storage)

    Data storage is the collective methods and technologies that capture and retain digital information on electromagnetic, optical ...

  • storage medium (storage media)

    In computers, a storage medium is a physical device that receives and retains electronic data for applications and users and ...

Close