Browse Definitions :

Network software

Terms related to network software, including definitions about network monitoring and words and phrases about network administration.

802 - HP

  • 802.11k - 802.11k is a proposed standard for a series of measurement requests and reports involving channel selection, roaming, transmit power control (TPC), and subscriber statistics in 802.
  • 802.16 - 802.16 is a group of broadband wireless communications standards for metropolitan area networks (MANs) developed by a working group of the Institute of Electrical and Electronics Engineers (IEEE).
  • 802.16a - 802.16a is a wireless communications specification for metropolitan area networks (MANs).
  • 802.16c - 802.16c is a set of clarifications and updates to the 102.
  • AAA server (authentication, authorization, and accounting) - An AAA server is a server program that handles user requests for access to computer resources and, for an enterprise, provides authentication, authorization, and accounting (AAA) services.
  • active directory - Active Directory (AD) is Microsoft's proprietary directory service.
  • Advanced Peer-to-Peer Networking (APPN) - Advanced Peer-to-Peer Networking (APPN), part of IBM's Systems Network Architecture (SNA), is a group of protocols for setting up or configuring program-to-program communication within an IBM SNA network.
  • analog telephone adapter (ATA) - An analog telephone adaptor (ATA) is a device used to connect a standard telephone to a computer or network so that the user can make calls over the Internet.
  • Apache HTTP Server - Apache HTTP Server is a freely-available Web server software package that is distributed under an open source license.
  • Apache Kafka - Apache Kafka is a distributed publish-subscribe messaging system that receives data from disparate source systems and makes the data available to target systems in real time.
  • AppleTalk - AppleTalk is a set of local area network communication protocols originally created for Apple computers.
  • application awareness - Application awareness is the capacity of a system to maintain information about connected applications to optimize their operation and that of any subsystems that they run or control.
  • application clustering (software clustering) - Application clustering (sometimes called software clustering) is a method of turning multiple computer servers into a cluster (a group of servers that acts like a single system).
  • Application layer - Sitting at Layer 7 -- the very top of the Open Systems Interconnection (OSI) communications model -- the application layer provides services for an application program to ensure that effective communication with another application program on a network is possible.
  • application performance monitoring (APM) - Application performance monitoring (APM) is the collection of tools and processes designed to help information technology (IT) professionals ensure that the applications users work with meet performance standards and provide a valuable user experience (UX).
  • application server - An application server is a server program in a computer in a distributed network that provides the business logic for an application program.
  • application streaming - Application streaming is an on-demand software delivery model that takes advantage of the fact that most applications require only a small fraction of their total program code to run.
  • application-defined networking - Application-defined networking (ADN) is a networking scenario in which applications have the ability to adapt network environments to meet their needs, rather than having resources allocated by the network.
  • ASN.1 (Abstract Syntax Notation One) - ASN.1 (Abstract Syntax Notation One) is a standard way to describe a message (a unit of application data) that can be sent or received in a network.
  • authentication, authorization, and accounting (AAA) - Authentication, authorization, and accounting (AAA) is a framework for intelligently controlling access to computer resources, enforcing policies, auditing usage, and providing the information necessary to bill for services.
  • automated speech recognition (ASR) - Automated speech recognition (ASR) is a technology that allows users of information systems to speak entries rather than punching numbers on a keypad.
  • Automatic Private IP Addressing (APIPA) - Automatic Private IP Addressing (APIPA) is a feature of Windows-based operating systems (included in Windows 98, ME, 2000, and XP) that enables a computer to automatically assign itself an IP address when there is no Dynamic Host Configuration Protocol (DHCP) server available to perform that function.
  • autotrunking - Autotrunking is a function that can be activated for one or more switch ports in a Cisco system of virtual local area networks (VLANs), making those ports capable of carrying traffic for any or all of the VLANs accessible by a particular switch.
  • backhaul - Backhaul, a term probably derived from the trucking industry, has several usages in information technology.
  • bandwidth test (testing your bandwidth) - A bandwidth test is a program that sends one or more files of known size over a network to a distant computer (for example, your own computer), measures the time required for the file(s) to successfully download at the destination, and thereby obtains a theoretical figure for the data speed between two or more points, usually in kilobits per second (Kbps) or megabits per second (Mbps).
  • baud - Baud was the prevalent measure for data transmission speed until replaced by a more accurate term, bps (bits per second).
  • beaming - In infrared transmission, beaming is the communication of data between wireless devices using a beam of infrared light.
  • Big Switch Big Network Controller - Big Network Controller is the SDN controller for the Open Software Defined Network (SDN), a product suite for network virtualization released in November of 2012 by Big Switch Networks.
  • Big Switch Networks - Big Switch Networks is a network virtualization and SDN (software-defined networking) company that was founded in 2010.
  • Big Switch Networks Big Virtual Switch - Big Virtual Switch is a data center network virtualization application that runs on Big Network Controller, the SDN controller for the Open Software-Defined Network (SDN).
  • BITNET - BITNET is a network of academic sites comparable to but separate from the Internet.
  • BitTorrent - BitTorrent is a content distribution protocol that enables efficient software distribution and peer-to-peer sharing of very large files, such as entire movies and TV shows, by enabling users to serve as network redistribution points.
  • block - A block is a contiguous set of bits or bytes that forms an identifiable unit of data.
  • BOOTP (Bootstrap Protocol) - BOOTP (Bootstrap Protocol) is a protocol that lets a network user be automatically configured (receive an IP address) and have an operating system booted (initiated) without user involvement.
  • BREW (Binary Runtime Environment for Wireless) - BREW (Binary Runtime Environment for Wireless) is Qualcomm's open source application development platform for wireless devices equipped for code division multiple access (CDMA) technology.
  • buffer credits or buffer-to-buffer credits (BBCs) - Buffer credits, also called buffer-to-buffer credits (BBCs), allow data communication in a Fibre Channelstorage area network (SAN) where there are long spans of fiber opticcable.
  • cache (computing) - A cache -- pronounced CASH -- is hardware or software that is used to store something, usually data, temporarily in a computing environment.
  • captive portal - A captive portal is a Web page that the user of a public-access network is obliged to view and interact with before access is granted.
  • certification - In information technology as in other fields such as teaching, accounting, and acupuncture, certification is a formal process of making certain that an individual is qualified in terms of particular knowledge or skills.
  • CIDR (Classless Inter-Domain Routing or supernetting) - CIDR (Classless Inter-Domain Routing) -- also known as supernetting -- is a method of assigning Internet Protocol (IP) addresses that improves the efficiency of address distribution and replaces the previous system based on class A, class B and class C networks.
  • circuit-switched - Circuit-switched is a type of network in which a physical path is obtained for and dedicated to a single connection between two end-points in the network for the duration of the connection.
  • Cisco Enterprise Agreement (EA) - Cisco Enterprise Agreement (EA) is a software buying program that digitizes and simplifies license management for Cisco suite customers.
  • Class of Service (CoS) - Class of Service (CoS) is a way of managing traffic in a network by grouping similar types of traffic (for example, e-mail, streaming video, voice, large document file transfer) together and treating each type as a class with its own level of service priority.
  • cloaking - Cloaking is the masking of the sender's name and address in an e-mail note or distribution.
  • Clonezilla - Clonezilla is a free open source disk cloning application based on Debian.
  • Cluster Labs Pacemaker - Pacemaker is an open source high-availability cluster software developed from a collaboration between Red Hat and Novell.
  • codec - A codec is either a hardware device or a software-based process that compresses and decompresses large amounts of data used in voice over IP, video conferencing and streaming media.
  • collision - In a half duplex Ethernet network, a collision is the result of two devices on the same network attempting to transmit data at exactly the same time.
  • comfort noise generator (CNG) - A comfort noise generator (CNG) is a program used to generate background noise artificially for voice communications during periods of silence that occur during the course of conversation.
  • communication portal - A communication portal is a service that allows individuals, businesses, schools and government agencies to share information from diverse sources using unified communications (UC) media.
  • communications-enabled business processes (CEBP) - Communications-enabled business processes (CEBP) is the integration of communications capabilities into software-enabled business procedures, applications and technologies.
  • connection - In telecommunication and computing in general, a connection is the successful completion of necessary arrangements so that two or more parties (for example, people or programs) can communicate at a long distance.
  • connection broker - In desktop virtualization, a connection broker is a software program that allows the end-user to connect to an available desktop.
  • connection-oriented - In telecommunications, connection-oriented describes a means of transmitting data in which the devices at the end points use a preliminary protocol to establish an end-to-end connection before any data is sent.
  • connectionless - In telecommunication, connectionless describes communication between two network end points in which a message can be sent from one end point to another without prior arrangement.
  • CRAM (challenge-response authentication mechanism) - CRAM (challenge-response authentication mechanism) is the two-level scheme for authenticating network users that is used as part of the Web's Hypertext Transfer Protocol (HTTP).
  • cross-bar switch - In a network, a cross-bar switch is a device that is capable of channeling data between any two devices that are attached to it up to its maximum number of ports.
  • CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) - CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) is a protocol for carrier transmission in 802.
  • cyclic redundancy checking - Cyclic redundancy checking is a method of checking for errors in data that has been transmitted on a communications link.
  • data availability - Data availability is a term used by some computer storage manufacturers and storage service providers (SSPs) to describe products and services that ensure that data continues to be available at a required level of performance in situations ranging from normal through "disastrous.
  • data center services - Data center services is a collective term for all the supporting components necessary to the proper operation of data center.
  • data link control (DLC) - DLC also is an abbreviation for digital loop carrier.
  • data streaming - Data streaming is the continuous transfer of data at a steady, high-speed rate.
  • Data-Link layer - The data link layer is the protocol layer in a program that handles the moving of data into and out of a physical link in a network.
  • DCE (Distributed Computing Environment) - In network computing, DCE (Distributed Computing Environment) is an industry-standard software technology for setting up and managing computing and data exchange in a system of distributed computers.
  • deep packet inspection (DPI) - Deep packet inspection (DPI) is an advanced method of examining and managing network traffic.
  • desktop virtualization - Desktop virtualization is the concept of isolating a logical operating system (OS) instance from the client that is used to access it.
  • DHCP (Dynamic Host Configuration Protocol) - DHCP (Dynamic Host Configuration Protocol) is a network management protocol used to dynamically assign an Internet Protocol (IP) address to any device, or node, on a network so they can communicate using IP.
  • Differentiated Services (DiffServ, or DS) - Differentiated Services (DiffServ, or DS) is a protocol for specifying and controlling network traffic by class so that certain types of traffic get precedence - for example, voice traffic, which requires a relatively uninterrupted flow of data, might get precedence over other kinds of traffic.
  • Directory Services Restore Mode (DSRM) - Directory Services Restore Mode (DSRM) is a safe mode boot option for Windows Server domain controllers.
  • Distributed Control Plane Architecture (DCPA) - A Distributed Control Plane Architecture (DCPA) is a network architecture that makes it possible to allocate control protocol functions across multiple processor levels in the network system.
  • distributed file system (DFS) - A distributed file system is a client/server-based application that allows clients to access and process data stored on the server as if it were on their own computer.
  • domain controller - Primary domain controller (PDC) and backup domain controller (BDC) are roles that can be assigned to a server in a network of computers that use the Windows NT operating system.
  • DSC pull server - A DSC pull server (desired state configuration pull server) is an automation server that allows configurations to be maintained on many servers, computer workstations and devices across a network.
  • DSML (Directory Services Markup Language) - DSML (Directory Services Markup Language) is an application of the Extensible Markup Language (XML) that enables different computer network directory formats to be expressed in a common format and shared by different directory systems.
  • dynamic DNS service - A dynamic DNS (domain name system) service is a company that charges a small fee to allow a user connecting to the Internet with a dynamic IP address to be able to use applications that require a static IP address.
  • dynamic multi-pathing (DMP) - Dynamic multi-pathing (DMP) is a type of communication path control software application.
  • ECC (error correction code or error checking and correcting) - ECC (either "error correction [or correcting] code" or "error checking and correcting") allows data that is being read or transmitted to be checked for errors and, when necessary, corrected on the fly.
  • EIGRP (Enhanced Interior Gateway Routing Protocol) - EIGRP (Enhanced Interior Gateway Routing Protocol) is a network protocol that lets routers exchange information more efficiently than with earlier network protocols.
  • encoding and decoding - Encoding is the process of putting a sequence of characters (letters, numbers, punctuation, and certain symbols) into a specialized digital format for efficient transmission or transfer.
  • endpoint security (endpoint security management) - Endpoint security is an approach to network protection that requires each computing device on a corporate network to comply with certain standards before network access is granted.
  • Enterprise Identity Mapping (EIM) - Enterprise Identity Mapping (EIM) is an open architecture from IBM for helping an enterprise manage the multiple user registries and identities that enable a computer user to access multiple applications with a single sign-on.
  • Ethernet - Ethernet is the traditional technology for connecting devices in a wired local area network (LAN) or wide area network (WAN), enabling them to communicate with each other via a protocol -- a set of rules or common network language.
  • Ethernet/IP (Ethernet Industrial Protocol) - Ethernet/IP (Ethernet Industrial Protocol) is a network communication standard capable of handling large amounts of data at speeds of 10 Mbps or 100 Mbps, and at up to 1500 bytes per packet.
  • ethical worm - An ethical worm is a program that automates network-based distribution of security patches for known vulnerabilities.
  • event handler - An event handler is a callback routine that operates asynchronously and handles inputs received into a program.
  • Fast Ethernet - Fast Ethernet is a local area network (LAN) transmission standard that provides a data rate of 100 megabits per second (referred to as "100BASE-T").
  • fast packet technology - In data transmission, a fast packet is one that is transmitted without any error checking at points along the route.
  • fax server - A fax server (or faxserver) is a system installed in a local area network (LAN) server that allows computer users who are attached to the LAN to send and receive fax messages.
  • Fibre Channel over IP (FCIP or FC/IP) - Fibre Channel over IP (FCIP or FC/IP, also known as Fibre Channel tunneling or storage tunneling) is an Internet Protocol (IP)-based storage networking technology developed by the Internet Engineering Task Force (IETF).
  • file server - In the client/server model, a file server is a computer responsible for the central storage and management of data files so that other computers on the same network can access the files.
  • flooding - In a network, flooding is the forwarding by a router of a packet from any node to every other node attached to the router except the node from which the packet arrived.
  • Floodlight - Floodlight is a Java-based OpenFlow controller.
  • flow control - Flow control is the management of data flow between computers or devices or between nodes in a network so that the data can be handled at an efficient pace.
  • FlowVisor - FlowVisor is an experimental software-defined networking controller that enables network virtualization by slicing a physical network into multiple logical networks.
  • forward error correction (FEC) - Forward error correction (FEC) is a method of obtaining error control in data transmission in which the source (transmitter) sends redundant data and the destination (receiver) recognizes only the portion of the data that contains no apparent errors.
  • frame relay - Frame relay is an affordable way to transmit switched-packet data within LANs and WANs.
  • gatekeeper - A gatekeeper is a management tool for H.
  • Gigabit Ethernet - Gigabit Ethernet, a transmission technology based on the Ethernet frame format and protocol used in local area networks (LANs), provides a data rate of 1 billion bits per second (one gigabit).
  • GMPLS (Generalized Multiprotocol Label Switching or Multiprotocol Lambda Switching) - GMPLS (Generalized Multiprotocol Label Switching), also known as Multiprotocol Lambda Switching, is a technology that provides enhancements to Multiprotocol Label Switching (MPLS) to support network switching for time, wavelength, and space switching as well as for packet switching.
SearchCompliance
  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

SearchSecurity
  • threat modeling

    Threat modeling is a procedure for optimizing application, system or business process security by identifying objectives and ...

  • social engineering

    Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into ...

  • distributed denial-of-service (DDoS) attack

    A distributed denial-of-service (DDoS) attack is one in which multiple compromised computer systems attack a target, such as a ...

SearchHealthIT
SearchDisasterRecovery
  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

SearchStorage
  • storage security

    Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted ...

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud data management

    Cloud data management is a way to manage data across cloud platforms, either with or instead of on-premises storage.

Close