Browse Definitions :

Network hardware

Terms related to network hardware, including definitions about cables or file servers and words and phrases about routers and switches.

FEM - NET

  • female connector - A female connector is a connector attached to a wire, cable, or piece of hardware, having one or more recessed holes with electrical terminals inside, and constructed in such a way that a plug with exposed conductors (male connector) can be inserted snugly into it to ensure a reliable physical and electrical connection.
  • femtocell - A femtocell is a wireless access point that improves cellular reception inside a home or office building.
  • fiber jumper - A fiber jumper, sometimes called a fiber patch cord is a length of fiber cabling fitted with LC, SC, MTRJ or ST connectors at each end.
  • FICON (Fiber Connectivity) - FICON (for Fiber Connectivity) is a high-speed input/output (I/O) interface for mainframe computer connections to storage devices.
  • file server - In the client/server model, a file server is a computer responsible for the central storage and management of data files so that other computers on the same network can access the files.
  • forward error correction (FEC) - Forward error correction (FEC) is a method of obtaining error control in data transmission in which the source (transmitter) sends redundant data and the destination (receiver) recognizes only the portion of the data that contains no apparent errors.
  • four-way server - A four-way server is a server that incorporates a multi-core processor for increased performance.
  • fractional T1 - A fractional T1 or T3 line is a T1 or T3 digital phone line in the North American T-carrier system that is leased to a customer at a fraction of its data-carrying capacity and at a correspondingly lower cost.
  • full-disk encryption (FDE) - What is full-disk encryption (FDE)?Full-disk encryption (FDE) is encryption at the hardware level.
  • full-duplex - Full-duplex data transmission means that data can be transmitted in both directions on a signal carrier at the same time.
  • gatekeeper - A gatekeeper is a management tool for H.
  • geo-fencing (geofencing) - Geo-fencing is a feature in a software program that uses the global positioning system (GPS) or radio frequency identification (RFID) to define geographical boundaries.
  • graceful degradation - Graceful degradation is the ability of a computer, machine, electronic system or network to maintain limited functionality even when a large portion of it has been destroyed or rendered inoperative.
  • green collar - Green collar is any kind of employment that involves products or services that are environmentally friendly.
  • green networking - Green networking is the practice of selecting energy-efficient networking technologies and products, and minimizing resource use whenever possible.
  • greenfield deployment - In networking, a greenfield deployment is the installation and configuration of a network where none existed before, for example in a new office.
  • grid storage - Grid storage is a general term for any approach to storing data that employs multiple self-contained storage nodes interconnected so that any node can communicate with any other node without the data having to pass through a centralized switch.
  • GTAG (Global Tag) - GTAG (Global Tag) is a standardization initiative of the Uniform Code Council (UCC) and the European Article Numbering Association (EAN) for asset tracking and logistics based on radio frequency identification (RFID).
  • hard reset (factory reset; master reset) - A hard reset, also known as a factory reset or master reset, is the restoration of a device, such as a smartphone or tablet, to its state when it left the factory.
  • Hardware as a Service (in grid computing) - Hardware as a Service (Haas), in a grid computing context, is a pay-as-you-go model for accessing a provider's infrastructure and CPU power.
  • hardware load-balancing device (HLD) - A hardware load-balancing device (HLD), also known as a layer 4-7 router, is a physical unit that directs computers to individual servers in a network, based on factors such as server processor utilization, the number of connections to a server, or the overall server performance.
  • hardware VPN - A hardware VPN is a virtual private network ( VPN) based on a single, stand-alone device.
  • hardware-as-a-service (in managed services) - Hardware-as-a-service (HaaS) is a procurement model that is similar to leasing or licensing in which hardware that belongs to a managed service provider (MSP) is installed at a customer's site and a service level agreement (SLA) defines the responsibilities of both parties.
  • high availability (HA) - High availability (HA) is the ability of a system or system component to be continuously operational for a desirably long length of time.
  • High-Speed Serial Interface (HSSI) - High-Speed Serial Interface (HSSI) is a short-distance communications interface that is commonly used to interconnect routing and switching devices on local area networks (LANs) with the higher-speed lines of a wide area network (WAN).
  • home network - Using Mobile IP (Mobile Internet Protocol), the home network is where a mobile device has its permanent IP address.
  • HomePNA - HomePNA is an industry standard for interconnecting computers within a home using existing telephone lines and registered jack.
  • hop - In a packet-switching network, a hop is the trip a data packet takes from one router or intermediate point to another in the network.
  • hot site and cold site - A hot site is a commercial disaster recovery service that allows a business to continue computer and network operations in the event of a computer or equipment disaster.
  • Huawei Technologies - Huawei is a Chinese information and communications technology (ICT) company that specializes in telecommunications equipment.
  • hybrid fiber coaxial network (HFC network) - A hybrid fiber coaxial (HFC) network is a telecommunication technology in which optical fiber cable and coaxial cable are used in different portions of a network to carry broadband content (such as video, data, and voice).
  • i-Mode - i-Mode is the packet-based service for mobile phones offered by Japan's leader in wireless technology, NTT DoCoMo.
  • InfiniBand - InfiniBand is an architecture and specification for data flow between processors and I/O devices.
  • infranet - The infranet is a proposed universal, public, packet-switched supplement to the Internet for businesses and high-demand private users that would provide guaranteed security, reliability, and quality of service (QoS).
  • Infranet Initiative - The Infranet Initiative is a collaborative effort to develop a high-performance universal public network that would serve as a supplement to the Internet for businesses and other high-demand users.
  • infrastructure (IT infrastructure) - Infrastructure is the foundation or framework that supports a system or organization.
  • infrastructure management (IM) - For an organization's information technology, infrastructure management (IM) is the management of essential operation components, such as policies, processes, equipment, data, human resources, and external contacts, for overall effectiveness.
  • ingress - Ingress (pronounced IHN-grehs, from Latin ingressus or stepping into) is the act of entering something.
  • inline network device - An inline network device is one that receives packets and forwards them to their intended destination.
  • integrated T1 (channelized T1) - Integrated T1 (also called channelized T is a digital carrier modulation method in which a T1 line is divided into 24 channels, each having a maximum data speed of 64 thousand bits per second (Kbps), and each capable of supporting a unique application that can run concurrently with, but independently of, other applications on different channels.
  • interconnection - Interconnection is a strategy for ensuring that businesses can privately, securely and directly exchange digital information.
  • intermediate distribution frame (IDF) - An intermediate distribution frame (IDF) is a free-standing or wall-mounted rack for managing and interconnecting the telecommunications cable between end user devices and a main distribution frame (MDF).
  • Internet Routing in Space (IRIS) - Internet Routing in Space in Space, also known as (IRIS), is a project being conducted by the U.
  • intrusion prevention - Intrusion prevention is a preemptive approach to network security used to identify potential threats and respond to them swiftly.
  • IP PBX (private branch exchange) - An IP PBX is a private branch exchange (telephone switching system within an enterprise) that switches calls between VoIP (voice over Internet Protocol or IP) users on local lines while allowing all users to share a certain number of external phone lines.
  • IP storage - IP storage is a general term for several approaches to using the Internet Protocol (IP) in a storage area network (SAN) usually over Gigabit Ethernet.
  • IP surveillance - IP surveillance is a digitized and networked version of closed-circuit television (CCTV).
  • jabber (in networks) - In networks, a jabber is any device that is handling electrical signals improperly, usually with negative results for the rest of the network.
  • jam - In an Ethernet network, a jam is a signal from one device to all other devices that a collision has occurred.
  • keylogger (keystroke logger or system monitor) - A keylogger, sometimes called a keystroke logger or system monitor, is a type of surveillance technology used to monitor and record each keystroke typed on a specific computer's keyboard.
  • keystone jack - A keystone jack is a female connector used in data communications, particularly local area networks (LANs).
  • lambda switching (photonic switching, or wavelength switching) - Lambda switching (sometimes called photonic switching, or wavelength switching) is the technology used in optical networking to switch individual wavelengths of light onto separate paths for specific routing of information.
  • LAN party - A LAN party is a gathering in which gamers (devotees of computer games) gather to share a local area network (LAN) and participate in extended gaming sessions of popular games such as Quake, Doom, or Wolfenstein.
  • layer 3 - Layer 3 refers to the Network layer of the commonly-referenced multilayered communication model, Open Systems Interconnection (OSI).
  • Learning Path: Network Infrastructure - NETWORK INFRASTRUCTURE.
  • level of support (support level) - Level of support indicates a specific extent of technical assistance in the total range of assistance that is provided by an information technology product (such as a software product) to its customers.
  • line doubler - A line doubler is an electronic device that converts analog or digital television (TV) video signals into a format suitable for display on a computer monitor.
  • Link Quality Source Routing (LQSR) - LQSR (Link Quality Source Routing) is a routing protocol for wireless mesh networks.
  • link-load balancer (link balancer) - A link load balancer, also called a link balancer, is a network appliance that distributes in-bound and out-bound traffic to and from multiple Internet Service Providers (ISPs) links.
  • liquid-tight strain-relief connector - A liquid-tight strain-relief connector is a special electrical connector or jacket used in cabling for electronic and computer systems where water or contaminant intrusion is a concern.
  • load testing - Load testing is the process of subjecting a computer, peripheral, server, network or application to a work level approaching the limits of its specifications.
  • local area network (LAN) - A local area network (LAN) consists of computers and peripherals that share a common communications line or wireless link to a server.
  • logical router - A logical router is a configured partition of a traditional network hardware, or "physical," router.
  • loopback test - A loopback test is a test in which a signal in sent from a communications device and returned (looped back) to it as a way to determine whether the device is working right or as a way to pin down a failing node in a network.
  • MAC address (Media Access Control address) - In a local area network (LAN) or other network, the MAC (Media Access Control) address is your computer's unique hardware number.
  • male connector (or plug) - A male connector is a connector attached to a wire, cable, or piece of hardware, having one or more exposed, unshielded electrical terminal s, and constructed in such a way that it can be inserted snugly into a receptacle (female connector) to ensure a reliable physical and electrical connection.
  • Manchester encoding - In data transmission, Manchester encoding is a form of digital encoding in which data bits are represented by transitions from one logical state to the other.
  • master - A master, in a technological context, is a device that controls one or more other devices.
  • master/slave - In computer networking, master/slave is a model for a communication protocol in which one device or process (known as the master) controls one or more other devices or processes (known as slaves).
  • MDI/MDIX (medium dependent interface/MDI crossover) - MDI/MDIX is a type of Ethernet port connection using twisted pair cabling.
  • Media Access Control layer (MAC layer) - In the Open Systems Interconnection (OSI) model of communication, the Media Access Control layer is one of two sublayers of the Data Link Control layer and is concerned with sharing the physical connection to the network among several computers.
  • media attachment unit (MAU) - MAU is also sometimes used as the abbreviation for the token ring network multistation access unit (MSAU).
  • mesh network topology (mesh network) - A mesh network is a network in which the devices -- or nodes -- are connected so that at least some, and sometimes all, have multiple paths to other nodes.
  • metropolitan area network (MAN) - A metropolitan area network (MAN) is a network that interconnects users with computer resources in a geographic area or region larger than that covered by even a large local area network (LAN) but smaller than the area covered by a wide area network (WAN).
  • Microsoft Assessment and Planning (MAP) Toolkit - Microsoft Assessment and Planning (MAP) Toolkit is a free utility IT can use to determine whether or not its infrastructure is prepared for a migration to a new operating system, server version or cloud-based deployment.
  • MiFi - MiFi is a portable broadband device that allows multiple end users and mobile devices to share a 3G or 4G mobile broadband Internet connection and create an ad-hoc network.
  • MIMO (multiple input, multiple output) - MIMO (multiple input, multiple output) is an antenna technology for wireless communications in which multiple antennas are used at both the source (transmitter) and the destination (receiver).
  • MISO (multiple input, single output) - MISO (multiple input, single output) is an antenna technology for wireless communications in which multiple antennas are used at the source (transmitter).
  • modem - A modem modulates outgoing digital signals from a computer or other digital device to analog signals for a conventional copper twisted pair telephone line and demodulates the incoming analog signal and converts it to a digital signal for the digital device.
  • modem lights (AA) - This page provides a description of the abbreviations and meanings of each of the lights that describe the "handshaking" between a computer modem and the UART chip in a computer.
  • modular datacenter - Sun Microsystems' Modular Datacenter (known as "Project Blackbox" in the prototype phase) is a mobile and virtualized data center packaged in a standard 20-foot shipping container.
  • Molex - In business since 1938, Molex manufactures electronic, electrical, and optical fiber connectors.
  • Morse code - Morse code is a method of sending text messages by keying in a series of electronic pulses, usually represented as a short pulse (called a "dot") and a long pulse (a "dash").
  • multi-tapping - Multi-tapping is an older procedure used to enter text using a telephone keypad.
  • multilink bundle - A multilink bundle is a collection of simultaneously opened bandwidth channels, including video and data links, that are coherently and logically controlled by preset commands.
  • multistation access unit (MSAU) - A multistation access unit (MSAU) is a hub or concentrator that connects a group of computers ('nodes' in network terminology) to a token ring local area network.
  • mux - In communication transmission systems, mux (pronounce muks, sometimes spelled "MUX") is an abbreviation for multiplexing, a device that sends multiple signals on a carrier channel at the same time in the form of a single, complex signal to another device that recovers the separate signals at the receiving end.
  • Nagle's algorithm - Named for its creator, John Nagle, the Nagle algorithm is used to automatically concatenate a number of small buffer messages; this process (called nagling) increases the efficiency of a network application system by decreasing the number of packets that must be sent.
  • NAS accelerator - A NAS accelerator (network-attached storage accelerator) is a printed circuit card that offloads TCP/IP processing from a microprocessor.
  • NBASE-T Ethernet - NBASE-T Ethernet is an IEEE standard and Ethernet-signaling technology that allows existing twisted-pair copper cabling to exceed the cable's specified limit of 1 Gbps for distances of up to 100 meters.
  • Near Field Communication (NFC) - Near Field Communication (NFC) is a short-range wireless connectivity standard (Ecma-340, ISO/IEC 18092) that uses magnetic field induction to enable communication between devices when they're touched together, or brought within a few centimeters of each other.
  • near-end crosstalk (NeXT) - Also see NeXT, a computer company that developed a personal computer with an advanced user interface and operating system.

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • spyware

    Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge.

  • application whitelisting

    Application whitelisting is the practice of specifying an index of approved software applications or executable files that are ...

  • botnet

    A botnet is a collection of internet-connected devices, which may include PCs, servers, mobile devices and internet of things ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • DRAM (dynamic random access memory)

    Dynamic random access memory (DRAM) is a type of semiconductor memory that is typically used for the data or program code needed ...

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

Close