Browse Definitions :

Network administration

Terms related to managing computer networks, including definitions about LANS or WANS and words and phrases about network design, troubleshooting, security and backups.

DAT - INT

  • data availability - Data availability is a term used by computer storage manufacturers and storage service providers to describe how data should be available at a required level of performance in situations ranging from normal through disastrous.
  • data breach - A data breach is a cyber attack in which sensitive, confidential or otherwise protected data has been accessed or disclosed in an unauthorized fashion.
  • data center bridging (DCB) - DCB is a suite of IEEE standards designed to enable lossless transport over Ethernet and a converged network for all data center applications.
  • data center services - Data center services is a collective term for all the supporting components necessary to the proper operation of data center.
  • data link control (DLC) - DLC also is an abbreviation for digital loop carrier.
  • data link layer - The data link layer is the protocol layer in a program that handles the moving of data into and out of a physical link in a network.
  • data protection management (DPM) - Data protection management (DPM) comprises the administration, monitoring and management of backup processes to ensure backup tasks run on schedule and data is securely backed up and recoverable.
  • data reduction - Data reduction is the process of reducing the amount of capacity required to store data.
  • data streaming - Data streaming is the continuous transfer of data at a steady, high-speed rate.
  • database activity monitoring (DAM) - Database activity monitoring (DAM) systems monitor and record activity in a database and then generate alerts for anything unusual.
  • DCE (Distributed Computing Environment) - In network computing, DCE (Distributed Computing Environment) is an industry-standard software technology for setting up and managing computing and data exchange in a system of distributed computers.
  • deep packet inspection (DPI) - Deep packet inspection (DPI) is an advanced method of examining and managing network traffic.
  • desktop management interface (DMI) - The desktop management interface (DMI) is a standard industry framework that manages and tracks components on one or more personal computers, usually from a centralized console.
  • desktop virtualization - Desktop virtualization is the concept of isolating a logical operating system (OS) instance from the client that is used to access it.
  • device as a service (DaaS) - The device as a service (DaaS) model offers PCs, smartphones and other mobile computing devices as a paid service.
  • DHCP (Dynamic Host Configuration Protocol) - DHCP (Dynamic Host Configuration Protocol) is a network management protocol used to dynamically assign an Internet Protocol (IP) address to any device, or node, on a network so they can communicate using IP.
  • Differentiated Services (DiffServ, or DS) - Differentiated Services (DiffServ, or DS) is a protocol for specifying and controlling network traffic by class so that certain types of traffic get precedence - for example, voice traffic, which requires a relatively uninterrupted flow of data, might get precedence over other kinds of traffic.
  • DirectAccess - DirectAccess is a feature introduced in Windows Server 2008 R2 and Windows 7 that uses automated IPv6 and IPSec tunnels to allow remote users to access private network resources whenever they are connected to the Internet.
  • Directory Services Restore Mode (DSRM) - Directory Services Restore Mode (DSRM) is a safe mode boot option for Windows Server domain controllers.
  • disaggregated server - A disaggregated server is a server that breaks up components and resources into subsystems.
  • discrete event simulation (DES) - Discrete event simulation (DES) is the process of codifying the behavior of a complex system as an ordered sequence of well-defined events.
  • disk cloning - Disk cloning is the act of copying the contents of a computer's hard drive.
  • disk image - A disk image is a copy of the entire contents of a storage device, such as a hard drive, DVD, or CD.
  • Diskpart (Disk Partition Utility) - Diskpart is a command-line utility used to manipulate disk partitions in all versions of Windows and Windows Server beginning with Windows XP and Windows Server 2003.
  • distributed - Computing is said to be "distributed" when the computer programming and data that computers work on are spread out over more than one computer, usually over a network.
  • distributed antenna system (DAS) - A distributed antenna system (DAS) is a way to deal with isolated spots of poor coverage inside a large building by installing a network of relatively small antennas throughout the building to serve as repeaters.
  • Distributed Component Object Model (DCOM) - Distributed Component Object Model (DCOM) is an extension to Component Object Model (COM) that enables software components to communicate with each other across different computers on a local area network (LAN), on a wide area network (WAN) or across the internet.
  • Distributed Control Plane Architecture (DCPA) - A Distributed Control Plane Architecture (DCPA) is a network architecture that makes it possible to allocate control protocol functions across multiple processor levels in the network system.
  • distributed virtual switch - A distributed virtual switch is an abstract representation of multiple hosts defining the same name, network policy and port group.
  • DNS rebinding attack - DNS rebinding is an exploit in which the attacker uses JavaScript in a malicious Web page to gain control of the victim's router.
  • DNS redirection - DNS redirection is the controversial practice of serving a Web page to a user that is different from either the one requested or one that might reasonably be expected, such as an error page.
  • DNS Security Extensions (DNSSEC) - DNS Security Extensions (DNSSEC) are a set of Internet Engineering Task Force (IETF) standards created to address vulnerabilities in the Domain Name System (DNS) and protect it from online threats.
  • domain controller - A domain controller is a type of server that processes requests for authentication from users within a computer domain.
  • DSC pull server - A DSC pull server (desired state configuration pull server) is an automation server that allows configurations to be maintained on many servers, computer workstations and devices across a network.
  • dynamic multi-pathing (DMP) - Dynamic multi-pathing (DMP) is a type of communication path control software application.
  • dynamic port numbers - Dynamic port numbers, also known as private port numbers, are the port numbers that are available for use by any application to use in communicating with any other application, using the internet's Transmission Control Protocol (TCP) or User Datagram Protocol (UDP).
  • Dynamic Source Routing (DSR) - Dynamic Source Routing (DSR) is a self-maintaining routing protocol for wireless networks.
  • dynamic spectrum access (dynamic spectrum management) - Dynamic spectrum access (DSA), also referred to as dynamic spectrum management (DSM), is a set of spectrum utilization techniques that adjusts frequency in real time based on fluctuating circumstances.
  • eavesdropping - Eavesdropping is the unauthorized real-time interception of a private communication, such as a phone call, instant message, videoconference or fax transmission.
  • economizer - An economizer is a mechanical device that reduces the amount of energy used to cool a data center or other buildings.
  • EMC Corporation - EMC Corporation was a multinational provider of products and services related to cloud computing, storage, big data, data analytics, information security, content management and converged infrastructure.
  • employee monitoring - Employee monitoring is the use of various methods of workplace surveillance to gather information about the activities and locations of staff members.
  • encoding and decoding - Encoding and decoding are used in many forms of communications, including computing, data communications, programming, digital electronics and human communications.
  • end user policy - An end user policy is a set of directives that describes what actions employees must take -- or avoid -- in order to protect corporate assets.
  • endpoint device - An endpoint device is an Internet-capable computer hardware device on a TCP/IP network.
  • endpoint security (endpoint security management) - Endpoint security is an approach to network protection that requires each computing device on a corporate network to comply with certain standards before network access is granted.
  • endpoint security management - Endpoint security management is a policy-based approach to network security that requires endpoint devices to comply with specific criteria before they are granted access to network resources.
  • Energy Star - Energy Star is a government-backed labeling program that helps people and organizations save money and reduce greenhouse gas emissions by identifying factories, office equipment, home appliances and electronics that have superior energy efficiency.
  • Enhanced Interior Gateway Routing Protocol (EIGRP) - Enhanced Interior Gateway Routing Protocol (EIGRP) is a network protocol that enables routers to exchange information more efficiently than earlier network protocols, such as Interior Gateway Routing Protocol (IGRP) or Border Gateway Protocol (BGP).
  • Enterprise Service Bus (ESB) - An enterprise service bus (ESB) is a software platform used to distribute work among connected components of an application.
  • Ethernet - Ethernet is the traditional technology for connecting devices in a wired local area network (LAN) or wide area network (WAN).
  • Ethernet/IP (Ethernet Industrial Protocol) - Ethernet/IP (Ethernet Industrial Protocol) is a network communication standard capable of handling large amounts of data at speeds of 10 Mbps or 100 Mbps, and at up to 1500 bytes per packet.
  • event - An event, in a computing context, is an action or occurrence that can be identified by a program and has significance for system hardware or software.
  • event handler - In programming, an event handler is a callback routine that operates asynchronously once an event takes place.
  • event handling - Event handling is the receipt of an event at some event handler from an event producer and subsequent processes.
  • Event log management software (ELMS) - Event log management software (ELMS) is an application used to monitor change management and prepare for compliance audits at enterprises.
  • event stream processing (ESP) - Event stream processing (ESP) is a software capacity designed to support implementation of event-driven architectures.
  • event-driven architecture (EDA) - An event-driven architecture (EDA) is a framework that orchestrates behavior around the production, detection and consumption of events as well as the responses they evoke.
  • fault management - Fault management is the component of network management concerned with detecting, isolating and resolving problems.
  • FCAPS (fault, configuration, accounting, performance and security) - FCAPS (fault, configuration, accounting, performance and security) is a network management framework created by the International Organization for Standardization (ISO).
  • FDDI (Fiber Distributed Data Interface) - FDDI (Fiber Distributed Data Interface) is a network standard that uses fiber optic connections in a local area network (LAN) that can extend in range up to 200 kilometers (124 miles).
  • file server - A file server is a computer responsible for the storage and management of data files so that other computers on the same network can access the files.
  • Firesheep - Firesheep is a Firefox plug-in that automates session hijacking attacks over unsecured Wi-Fi networks.
  • fixed-length subnet mask (FLSM) - A fixed-length subnet mask (FLSM) refers to a type of enterprise or provider networking where a block of IP addresses is divided into multiple subnets of equal length (i.
  • flooding (network) - In a computer network, flooding occurs when a router uses a non-adaptive routing algorithm to send an incoming packet to every outgoing link except the node on which the packet arrived.
  • flow control - Flow control is the management of data flow between computers or devices or between nodes in a network so that the data can be handled at an efficient pace.
  • FlowVisor - FlowVisor is an experimental software-defined networking controller that enables network virtualization by slicing a physical network into multiple logical networks.
  • frame relay - Frame relay is a packet-switching telecommunications service designed for cost-efficient data transmission for intermittent traffic between local area networks (LANs) and between endpoints in wide area networks (WANs).
  • full-disk encryption (FDE) - What is full-disk encryption (FDE)?Full-disk encryption (FDE) is encryption at the hardware level.
  • gatekeeper - A gatekeeper is a management tool for H.
  • geolocation - Geolocation is the detection of the physical location of an Internet connected computing device.
  • Gigabit Ethernet (GbE) - Gigabit Ethernet (GbE), a transmission technology based on the Ethernet frame format and protocol used in local area networks (LANs), provides a data rate of 1 billion bits per second, or 1 gigabit (Gb).
  • global catalog (Active Directory) - A global catalog is a data storage source containing partial representations of objects found in a multidomain Active Directory Domain Services (ADDS) forest.
  • GMPLS (Generalized Multiprotocol Label Switching or Multiprotocol Lambda Switching) - GMPLS (Generalized Multiprotocol Label Switching) is a networking technology that enables fast and reliable network switching of data flows on any type of network infrastructure.
  • golden image - A golden image is a template for a virtual machine (VM), virtual desktop, server or hard disk drive.
  • Good Technology - Good Technology is a mobile security platform provider headquartered in Sunnyvale, California.
  • gpresult - Gpresult is a command-line tool that shows the RSoP (Resultant Set of Policy) for a user or computer based on applied Group Policy settings.
  • graceful degradation - Graceful degradation is the ability of a computer, machine, electronic system or network to maintain limited functionality even when a large portion of it has been destroyed or rendered inoperative.
  • green networking - Green networking is the practice of selecting energy-efficient networking technologies and products, and minimizing resource use whenever possible.
  • grid computing - Grid computing is a system for connecting a large number of computer nodes into a distributed architecture that delivers the compute resources necessary to solve complex problems.
  • Group Policy - Group Policy is a hierarchical infrastructure that allows a network administrator in charge of Microsoft's Active Directory to implement specific configurations for users and computers.
  • Group Policy Preferences - Group Policy Preferences are a set of extensions, introduced in Windows Server 2008, that increase the functionality of Group Policy Objects.
  • guest virtual machine (guest VM) - A guest virtual machine (guest VM) is the software component of a virtual machine (VM), an independent instance of an operating system (called a guest operating system) and its associated software and information.
  • H.245 - H.245 is a protocol for the transmission of call management and control signals in packet-based networks using H.
  • HAProxy - HAProxy (High Availability Proxy), developed by HAProxy Technologies LLC, is an open source load balancer proxy for TCP and HTTP applications.
  • hard reset (factory reset; master reset) - A hard reset, also known as a factory reset or master reset, is the restoration of a device, such as a smartphone or tablet, to its state when it left the factory.
  • HashiCorp - HashiCorp is a software company that provides a suite of modular DevOps infrastructure provisioning and management products.
  • Health IT (health information technology) - Health IT (health information technology) is the area of IT involving the design, development, creation, use and maintenance of information systems for the healthcare industry.
  • Heartbeat - Heartbeat is a program that runs specialized scripts automatically whenever a system is initialized or rebooted.
  • HELLO packet - A HELLO packet is a special data packet (message) that is sent out periodically from a router to establish and confirm network adjacency relationships to other routers in the Open Shortest Path First (OSPF) communications protocol.
  • high availability (HA) - High availability (HA) is the ability of a system to operate continuously without failing for a designated period of time.
  • hop - In a packet-switching network, a hop is the trip a data packet takes from one router or intermediate point to another in the network.
  • host virtual machine (host VM) - A host virtual machine is the server component of a virtual machine (VM), the underlying hardware that provides computing resources to support a particular guest virtual machine (guest VM).
  • hosted services - Hosted services are applications, IT infrastructure components or functions that organizations access from external service providers, typically through an internet connection.
  • hot spare - A hot spare, also called a hot standby, is a backup component that can be placed into service immediately when a primary component fails.
  • HPE OneView (formerly HP OneView) - HPE OneView, formerly known as HP OneView, is a converged infrastructure management platform that provides a unified interface for the administration of software-defined systems in a data center.
  • hybrid SDN - A hybrid SDN (software-defined network) is a network where both traditional networking and SDN protocols operate in the same environment.
  • hyper-hybrid cloud - A hyper-hybrid cloud is a complex distributed environment involving multiple and diverse interconnected public and private clouds, often from multiple providers.
  • I/O contention (input/output contention) - I/O contention (input/output contention), occurs when virtual machines compete for I/O resources because there is a limited storage bandwidth.
  • Identity of Things (IDoT) - The Identity of Things (IDoT) involves assigning unique identifiers with associated metadata to devices and objects (things), enabling them to connect and communicate effectively with other entities over the Internet.
SearchNetworking
  • network packet

    A network packet is a basic unit of data that's grouped together and transferred over a computer network, typically a ...

  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

SearchSecurity
  • data breach

    A data breach is a cyber attack in which sensitive, confidential or otherwise protected data has been accessed or disclosed in an...

  • insider threat

    An insider threat is a category of risk posed by those who have access to an organization's physical or digital assets.

  • data compliance

    Data compliance is a process that identifies the applicable governance for data protection, security, storage and other ...

SearchCIO
  • data privacy (information privacy)

    Data privacy, also called information privacy, is an aspect of data protection that addresses the proper storage, access, ...

  • leadership skills

    Leadership skills are the strengths and abilities individuals demonstrate that help to oversee processes, guide initiatives and ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

SearchHRSoftware
SearchCustomerExperience
  • recommerce

    Recommerce is the selling of previously owned items through online marketplaces to buyers who reuse, recycle or resell them.

  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

Close