Browse Definitions :

Network Mgmt

Terms related to managing computer networks, including definitions about LANS or WANS and words and phrases about network design, troubleshooting, security and backups.

NET - UNI

  • Net-SNMP (Net Simple Network Management Protocol) - Net-SNMP is a set of tools and libraries for implementing the Simple Network Management Protocol (SNMP) on enterprise networks.
  • NetApp Insight - NetApp Insight is an annual technical conference series for NetApp, a computer storage and data management company.
  • NETCONF - NETCONF is an IETF network management protocol that provides an administrator or network engineer with a secure way to configure a firewall, router, switch or other network device.
  • NetOps - NetOps, also referred to as NetOps 2.
  • network analytics - Network analytics is the application of big data principles and tools to the management and security of data networks.
  • Network as a Service (NaaS) - Network as a service (NaaS) is a business model for delivering enterprise-wide area network services virtually on a subscription basis.
  • network automation - Network automation is a methodology in which software automatically configures, provisions, manages and tests network devices.
  • network disaster recovery plan - A network disaster recovery plan is a set of procedures designed to prepare an organization to respond to an interruption of network services during a natural or manmade catastrophe.
  • network engineer - A network engineer is a technology professional who has the necessary skills to plan, implement and oversee the computer networks that support in-house voice, data, video and wireless network services.
  • network fabric - Network fabric is an industry term that describes a network topology in which devices pass data to each other through interconnecting switches.
  • network functions virtualization (NFV) - Network functions virtualization (NFV) is an initiative to virtualize network services traditionally run on proprietary, dedicated hardware.
  • network intrusion protection system (NIPS) - A network intrusion protection system (NIPS) is an umbrella term for a combination of hardware and software systems that protect computer networks from unauthorized access and malicious activity.
  • Network layer - Located at Layer 3 of the Open Systems Interconnection (OSI) communications model, the primary function of the network layer is to move data into and through other networks.
  • network management system - A network management system (NMS) is an application or set of applications that lets network engineers manage a network's independent components inside a bigger network management framework and performs several key functions.
  • network operations center (NOC) - A network operations center (NOC) is a centralized place from which enterprise information technology (IT) administrators -- either internal or third party -- supervise, monitor and maintain a telecommunications network.
  • network packet - A network packet is a small amount of data sent over Transmission Control Protocol/Internet Protocol (TCP/IP) networks.
  • network performance monitoring - Network performance monitoring is a process of measuring and monitoring the quality of service of a network to understand if it is properly operating.
  • network protocol - A network protocol is a set of established rules that dictate how to format, transmit and receive data so that computer network devices -- from servers and routers to endpoints -- can communicate, regardless of the differences in their underlying infrastructures, designs or standards.
  • network security - In information technology, network security is the act of maintaining the integrity of a computer network and the data within it.
  • network virtualization - Network virtualization is a method of combining the available resources in a network to consolidate multiple physical networks, divide a network into segments or create software networks between virtual machines (VMs).
  • NFV MANO (network functions virtualization management and orchestration) - NFV MANO (network functions virtualization management and orchestration), also called MANO, is an architectural framework for managing and orchestrating virtualized network functions (VNFs) and other software components.
  • NFVi (network functions virtualization infrastructure) - NFVi (network functions virtualization infrastructure) encompasses all of the networking hardware and software needed to support and connect virtual network functions in carrier networks.
  • Nginx - Nginx (pronounced engine x) is open source webserver software that also performs reverse proxy, load balancing, email proxy and HTTP cache services.
  • NIS (Network Information System) - NIS (Network Information System) is a network naming and administration system for smaller networks that was developed by Sun Microsystems.
  • Open Blueprint - Open Blueprint is IBM's strategic view of the network computing services and the relationship between these services.
  • Open Grid Services Architecture (OGSA) - The Open Grid Services Architecture (OGSA) is a set of standards defining the way in which information is shared among diverse components of large, heterogeneous grid systems.
  • operational costs - Definition - In information technology, operational costs document the price of running of IT services on a day-to-day basis.
  • operational level agreement (OLA) - An operational level agreement (OLA) is a contract that defines how various IT groups within a company plan to deliver a service or set of services.
  • operational technology (OT) - Operational technology (OT) is a category of hardware and software that monitors and controls how physical devices perform.
  • OpLock (opportunistic lock) - OpLocks are made to enable simultaneous file access by multiple users while also improving performance for synchronized caches.
  • OSI model (Open Systems Interconnection) - OSI (Open Systems Interconnection) is a reference model for how applications communicate over a network.
  • OTA update (over-the-air update) - An over-the-air (OTA) update is the wireless delivery of new software, firmware, or other data to mobile devices.
  • PaaS (platform as a service) - PaaS (platform as a service) is a cloud computing model where a third-party provider delivers hardware and software tools to users over the internet.
  • package manager or package management system (PMS) - A package manager, also known as a package management system (PMS), is a program used to install, uninstall and manage software packages.
  • packet coalescing - In network adapters using Network Driver Interface Specification (NDIS) versions 6.
  • parent partition - A parent partition is a logical hard drive division in the Microsoft Hyper-V environment that's responsible for running the hypervisor layer and creating and managing child partitions.
  • Path Computation Element Protocol (PCEP) - Path Computation Element (PCE) is a network component, application or node that can apply computational constraints and compute a network path or route by applying computational constraints in real time.
  • performance testing - Performance testing is a testing measure that evaluates the speed, responsiveness and stability of a computer, network, software program or device under a workload.
  • ping - A ping (Packet Internet or Inter-Network Groper) is a basic internet program that enables a user to test and verify if a particular destination Internet Protocol (IP) address exists and can accept requests in computer network administration.
  • policy engine - A policy engine is a software component that allows an organization to create, monitor and enforce rules about how network resources and the organization's data can be accessed.
  • Port Address Translation (PAT) - Port Address Translation (PAT), is an extension to network address translation (NAT) that permits multiple devices on a local area network (LAN) to be mapped to a single public IP address.
  • power usage effectiveness (PUE) - Power usage effectiveness (PUE) is a metric used to determine the energy efficiency of a data center.
  • private certificate authority (CA) - Private CA stands for private certificate authority and is an enterprise specific certificate authority that functions like a publicly trusted CA but is exclusively run by or for the enterprise.
  • private cloud appliance - A private cloud appliance is a hardware device that provides software-defined converged infrastructure functions for an organization’s proprietary network.
  • private IP address - A private IP address is a range of non-internet facing IP addresses used in an internal network.
  • privileged identity management (PIM) - Privileged identity management (PIM) is the monitoring and protection of superuser accounts in an organization’s IT environments.
  • problem - A problem, in an IT service management (ITSM) context, is an issue that could cause an incident.
  • programmable logic controller (PLC) - A programmable logic controller (PLC) is a small, modular solid state computer with customized instructions for performing a particular task.
  • proxy hacking - Proxy hacking, also known as proxy hijacking, is an attack technique designed to supplant an authentic Web page in a search engine's index and search results pages.
  • quality of service (QoS) - Quality of service (QoS) refers to any technology that manages data traffic to reduce packet loss, latency and jitter on a network.
  • RAT (remote access Trojan) - A remote access Trojan (RAT) is a malware program that gives an intruder administrative control over a target computer.
  • real-time application (RTA) - A real-time application (RTA) is an application program that functions within a time frame that the user senses as immediate or current.
  • real-time location system (RTLS) - A real-time location system (RTLS) is one of a number of technologies used to pinpoint the current geographic position and location of a target.
  • Receive Segment Coalescing (RSC) - Receive Segment Coalescing (RSC) is an offload technology in Windows Server 2012 and Windows Server 2012 R2 that can help reduce how much of the CPU is used in network processing.
  • Reliability, Availability and Serviceability (RAS) - Reliability, Availability and Serviceability (RAS) is a set of related attributes that must be considered when designing, manufacturing, purchasing or using a computer product or component.
  • remote desktop - Remote desktop is a program or an operating system feature that allows a user to connect to a computer in another location, see that computer's desktop and interact with it as if it were local.
  • remote desktop protocol (RDP) - Remote desktop protocol (RDP) is a secure network communications protocol from Microsoft.
  • remote replication - Remote replication is the process of copying production data to a device at a remote location for data protection or disaster recovery purposes.
  • Rich Internet Application (RIA) - A rich Internet application (RIA) is a Web application designed to deliver the same features and functions normally associated with deskop applications.
  • ring network - A ring network is a local area network (LAN) in which the nodes (workstations or other devices) are connected in a closed loop configuration.
  • rlogin (remote login) - Rlogin (remote login) is a UNIX command that allows an authorized user to login to other UNIX machines (hosts) on a network and to interact as if the user were physically at the host computer.
  • RMON (Remote Network Monitoring) - RMON (Remote Network Monitoring) provides standard information that a network administrator can use to monitor, analyze, and troubleshoot a group of distributed local area networks (LANs) and interconnecting T-1/E-1 and T-2/E-3 lines from a central site.
  • root partition - A root partition is the isolated area in a Microsoft Hyper-V environment where the hypervisor runs.
  • RSAT (Microsoft Remote Server Administration Tools) - RSAT (Remote Server Administration Tools) is a feature that began in Windows Server 2008 R2 to help admins remotely manage computers running Windows Server.
  • RtOI (real-time operational intelligence) - Real-time operational intelligence (RtOI) is an emerging industrial discipline that allows businesses to intelligently transform vast amounts of operational data into actionable information that is accessible anywhere, anytime and across many devices, including tablets and smartphones.
  • Secure Access Service Edge (SASE) - Secure Access Service Edge, also known as SASE -- pronounced 'sassy' -- is a cloud architecture that bundles network and security solutions together and delivers them as a unified cloud service.
  • Security as a Service (SaaS) - Security-as-a-service (SaaS) is an outsourcing model for security management.
  • security information management (SIM) - Security information management (SIM) is the practice of collecting, monitoring and analyzing security-related data from computer logs.
  • server farm (Web farm, Web server farm) - A server farm is a group of computers acting as servers and housed together in a single location.
  • service desk - A service desk is a communications center that provides a single point of contact (SPOC) between a company and its customers, employees and business partners.
  • service mesh - A service mesh is a dedicated infrastructure layer that controls service-to-service communication over a network.
  • session border controller (SBC) - A session border controller (SBC) is a dedicated hardware device or software application that governs the manner in which phone calls are initiated, conducted and terminated on a voice over Internet Protocol (VoIP) network.
  • shadow IT - Shadow IT is hardware or software that is not supported by an organization's IT department.
  • Shared Key Authentication (SKA) - Shared Key Authentication (SKA) is a process by which a computer can gain access to a wireless network that uses the Wired Equivalent Privacy (WEP) protocol.
  • Shodan - Shodan (Sentient Hyper-Optimised Data Access Network) is a search engine designed to map and gather information about internet-connected devices and systems.
  • short message service center (SMSC) - A short message service center (SMSC) is the portion of a wireless network that handles SMS operations, such as routing, forwarding and storing incoming text messages on their way to desired endpoints.
  • shrink wrap license - A shrink wrap license is an end user agreement (EULA) that is enclosed with software in plastic-wrapped packaging.
  • Simian Army - The Simian Army is a collection of open source cloud testing tools created by the online video streaming company, Netflix.
  • SIP trunking (Session Initiation Protocol trunking) - Session Initiation Protocol trunking is a service offered by a communications service provider that uses the protocol to provision voice over IP connectivity between an on-premises phone system and the public switched telephone network.
  • sliding window (windowing) - The sliding window (windowing) technique is used by Transmission Control Protocol (TCP) to manage the flow of packets between two computers or network hosts.
  • SMS gateway - An SMS gateway is a website that allows users to send SMS messages from a web browser to people within the cell served by that gateway.
  • Software as a Service (SaaS) - Software as a service (SaaS) is a software distribution model in which a third-party provider hosts applications and makes them available to customers over the Internet.
  • software package - A software package is an assemblage of files and information about those files.
  • software-defined networking monitoring application (SDN monitoring application) - An SDN monitoring application is a software program that oversees the traffic in a software-defined network (SDN) as a component of network management.
  • source deduplication - Source deduplication is the removal of redundancies from data before transmission to the backup target.
  • Space Communications Protocol Specifications (SCPS) - Space Communications Protocol Specifications (SCPS) are designed to improve communications reliability, error checking, efficiency and performance in ground, manned craft and satellite inter-communications.
  • Spanning Tree Protocol (STP) - Spanning Tree Protocol (STP) is a Layer 2 network protocol used to prevent looping within a network topology.
  • split brain syndrome - Split brain syndrome, in a clustering context, is a state in which a cluster of nodes gets divided (or partitioned) into smaller clusters of equal numbers of nodes, each of which believes it is the only active cluster.
  • split horizon - Split horizon is a method used by distance vector protocols to prevent network routing loops.
  • Squid proxy server - Squid is a Unix-based proxy server that caches Internet content closer to a requestor than its original point of origin.
  • SSL checker (secure socket layer checker) - An SSL checker (Secure Sockets Layer checker) is a tool that helps an organization verify proper installation of an SSL certificate on a Web server to ensure it is valid, trusted and will work properly for its users.
  • stack overflow - A stack overflow is an undesirable condition in which a particular computer program tries to use more memory space than the call stack has available.
  • standard operating environment (SOE) - Standard operating environments (SOE) simplify desktop deployment and network administration within an organization.
  • STONITH (Shoot The Other Node In The Head) - STONITH (Shoot The Other Node In The Head) is a Linux service for maintaining the integrity of nodes in a high-availability (HA) cluster.
  • superuser - A superuser is a network account with privilege levels far beyond those of most user accounts.
  • SWAN (state wide area network) - In India, SWAN is a government-subsidized project to create a state wide area network (WAN) that will improve government efficiency.
  • system administrator (sysadmin) - A system administrator (sysadmin) is an information technolog professional who supports a multiuser computing environment and ensures continuous, optimal performance of IT services and support systems.
  • target deduplication - Target deduplication is the removal of redundancies from a backup transmission as it passes through an appliance sitting between the source and the backup target.
  • TCP Wrapper - TCP Wrapper is a public domain computer program that provides firewall services for UNIX servers.
  • time-division multiplexing (TDM) - Time-division multiplexing (TDM) is a method of putting multiple data streams in a single signal by separating the signal into many segments, each having a very short duration.
SearchCompliance
  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity
  • encryption key

    In cryptography, an encryption key is a variable value that is applied using an algorithm to a string or block of unencrypted ...

  • payload (computing)

    In computing, a payload is the carrying capacity of a packet or other transmission data unit.

  • script kiddie

    Script kiddie is a derogative term that computer hackers coined to refer to immature, but often just as dangerous, exploiters of ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
Close