Browse Definitions :

Network software

Terms related to network software, including definitions about network monitoring and words and phrases about network administration.

SEC - ZON

  • Secure Shell (SSH) - SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system administrators, a secure way to access a computer over an unsecured network.
  • security identifier (SID) - In Windows NT and 2000 operating systems, the security identifier (SID) is a unique alphanumeric character string that identifies each operating system and each user in a network of NT/2000 systems.
  • security information management (SIM) - Security information management (SIM) is the practice of collecting, monitoring and analyzing security-related data from computer logs.
  • segmentation and reassembly (SAR) - In a packet-switched telecommunication network, segmentation and reassembly (SAR, sometimes just referred to as segmentation) is the process of breaking a packet into smaller units before transmission and reassembling them into the proper order at the receiving end of the communication.
  • Sequenced Packet Exchange (SPX) - SPX (Sequenced Packet Exchange) is the protocol for handling packet sequencing in a Novell NetWare network.
  • server - A server is a computer program or device that provides a service to another computer program and its user, also known as the client.
  • server consolidation - Server consolidation is an approach to the efficient usage of computer server resources in order to reduce the total number of servers or server locations that an organization requires.
  • Server Message Block Protocol (SMB protocol) - The Server Message Block Protocol (SMB protocol) is a client-server communication protocol used for sharing access to files, printers, serial ports and other resources on a network.
  • server sprawl - Server sprawl is a situation in which multiple, under-utilized servers take up more space and consume more resources than can be justified by their workload.
  • Service Location Protocol (SLP) - The Service Location Protocol (SLP) is a protocol or method of organizing and locating the resources (such as printers, disk drives, databases, e-mail directories, and schedulers) in a network.
  • session border controller (SBC) - A session border controller (SBC) is a dedicated hardware device or software application that governs the manner in which phone calls are initiated, conducted and terminated on a Voice over Internet Protocol (VoIP) network.
  • SFT III - SFT III is a feature providing fault-tolerance in Intel-based PC network server running Novell's NetWare operating system.
  • SIGTRAN (Signaling Transport) - SIGTRAN (for Signaling Transport) is the standard telephony protocol used to transport Signaling System 7 (SS7) signals over the Internet.
  • Simple Network Management Protocol (SNMP) - Simple Network Management Protocol (SNMP) is an application-layer protocol used to manage and monitor network devices and their functions.
  • SIP trunking (Session Initiation Protocol trunking) - Session Initiation Protocol (SIP) trunking is a service offered by a communications service provider that uses the protocol to provision voice over IP (VoIP) connectivity between an on-premises phone system and the public switched telephone network (PSTN).
  • Skinny Client Control Protocol (SCCP) - Skinny Client Control Protocol (SCCP) is a Cisco proprietary standard for terminal control for use with voice over IP (VoIP).
  • Skype - Skype is an Internet telephony service provider that offers free calling between computers and low-cost calling to regular telephones that aren't connected to the Internet.
  • sniffer - In common industry usage, a sniffer (with lower case "s") is a program that monitors and analyzes network traffic, detecting bottlenecks and problems.
  • softphone (soft client telephone) - A softphone (software telephone) is an application program that enables voice over Internet Protocol (VoIP) telephone calls from computing devices.
  • software-defined networking (SDN) - Software-defined networking (SDN) is a network architecture that aims to make data center networks agile and flexible.
  • software-defined networking monitoring application (SDN monitoring application) - An SDN monitoring application is a software program that oversees the traffic in a software-defined network (SDN) as a component of network management.
  • software-defined storage (SDS) - Software-defined storage (SDS) is a computer program that manages data storage resources and functionality and has no dependencies on the underlying physical storage hardware.
  • Source-route transparent (SRT) bridging - Source-route transparent (SRT) bridging is a bridging scheme developed by IBM that combines source-route bridging (SRB) and transparent bridging in the same network.
  • split horizon - Split horizon is a method of preventing a routing loop in a network.
  • SQL Server 2012 - Microsoft SQL Server 2012 is a relational database management system (RDBMS) designed for the enterprise environment.
  • Squid proxy server - Squid is a Unix-based proxy server that caches Internet content closer to a requestor than its original point of origin.
  • storage at the edge - Storage at the edge is the collective methods and technologies that capture and retain digital information at the periphery of the network, as close to the originating source as possible.
  • storage security - Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted networks - and unavailable to other entities.
  • storage snapshot - A storage snapshot is a set of reference markers for data at a particular point in time.
  • subnet (subnetwork) - A subnet, or subnetwork, is a segmented piece of a larger network.
  • subnetwork - A subnetwork is a separately identifiable part of a larger network that typically represents a certain limited number of host computers, the hosts in a building or geographic area, or the hosts on an individual local area network.
  • switched virtual circuit (SVC) - In a network, a switched virtual circuit (SVC) is a temporary virtual circuit that is established and maintained only for the duration of a data transfer session.
  • SYN scanning - SYN scanning is a tactic that a malicious hacker (or cracker) can use to determine the state of a communications port without establishing a full connection.
  • systems engineering (SE) - Systems engineering (SE) is an interdisciplinary area of technology that encompasses software and hardware systems design and development with consideration to their interconnections and the environment in which they operate.
  • TCP/IP offload engine (TOE) - The TCP/IP offload engine (TOE for short) is a technology that is gaining popularity in high-speed Ethernet systems for the purpose of optimizing throughput.
  • tcpdump - Tcpdump is an open source command-line tool for monitoring (sniffing) network traffic.
  • Tempest - Tempest was the name of a classified (secret) U.
  • tiered storage - Tiered storage is a way to assign different categories of data to various types of storage media with the objective of reducing the total cost of storage.
  • Tivoli - Tivoli Systems is an IBM-owned company that develops software that allows a business to manage its computing environment.
  • token ring - A token ring network connects computers in a ring or star topology to prevent the collision of data between two computers sending messages simultaneously.
  • TP0-TP4 (transport protocols 0 to 4) - TP0-TP4 (transport protocols 0 to 4) are the five protocols in the Transport layer of the Open Systems Interconnection (OSI) model for telecommunication.
  • Transaction Server (Viper) - This definition is generally duplicated under Viper.
  • transport layer - Positioned at Layer 4 of the Open Systems Interconnection (OSI) communications model, the transport layer ensures the reliable arrival of messages across a network and provides error-checking mechanisms and data flow controls.
  • Transport Services Access Point (TSAP) - A Transport Services Access Point (TSAP) is an end-point for communication between the Transport layer (layer 4) and the Session layer in the OSI (Open Systems Interconnection) reference model.
  • tree network - In telecommunication networks, a tree network is a combination of two or more star networks connected together.
  • Trema - Trema is an open source framework for developing OpenFlow controllers for software-defined networking in the Ruby and C programming languages.
  • Trivial File Transfer Protocol (TFTP) - Trivial File Transfer Protocol (TFTP) is an Internet software utility for transferring files that is simpler to use than the File Transfer Protocol (FTP) but less capable.
  • trouble ticket (trouble report) - A trouble ticket (sometimes called a trouble report) is a mechanism used in an organization to track the detection, reporting and resolution of some type of problem.
  • Tuxedo (Transactions for UNIX, Enhanced for Distributed Operation) - Tuxedo (which stands for Transactions for UNIX, Enhanced for Distributed Operation) is a middleware product that uses a message-based communications system to distribute applications across various operating system platforms and databases.
  • unified communications (UC) - Unified communications (UC) is a conceptual and technological framework for integrating various enterprise communication methods -- telephony, presence, voicemail, video calling and conferencing, email, instant messaging, etc.
  • Universal Plug and Play (UPnP) - Universal Plug and Play (UPnP) is a standard that uses Internet and Web protocols to enable devices such as PCs, peripherals, intelligent appliances, and wireless devices to be plugged into a network and automatically know about each other.
  • USB redirection (Universal Serial Bus redirection) - USB redirection lets end users plug peripheral devices into local USB ports and access them from virtual desktops.
  • vCPE (virtual customer premises equipment) - Virtual customer premises equipment (also referred to as vCPE or cloud CPE) are enterprise network services delivered through software.
  • virtual appliance - A virtual appliance is a virtual machine image file consisting of a pre-configured operating system environment and a single application.
  • virtual area network (VAN) - A virtual area network (VAN) is a network on which users are enabled to share a more visual sense of community through high band-width connections.
  • virtual circuit - A virtual circuit is a circuit or path between points in a network that appears to be a discrete, physical path but is actually a managed pool of circuit resources from which specific circuits are allocated as needed to meet traffic requirements.
  • Virtual Home Environment (VHE) - In mobile computing, the Virtual Home Environment (VHE) is the concept that a network supporting mobile users should provide them the same computing environment on the road that they have in their home or corporate computing environment.
  • virtual network adapter - A virtual network adapter is a program (instead of a physical network adapter) that allows a computer to connect to a network.
  • virtual network computing (VNC) - Virtual network computing (VNC) is a type of remote-control software that makes it possible to control another computer over a network connection.
  • virtual phone number - A virtual phone number is a telephone number is used to route calls to the user's actual phone number or numbers.
  • virtual private LAN service (VPLS) - Virtual private LAN service (VPLS) is a technology that makes it possible to connect geographically dispersed local area networks (LANs) logically over the Internet.
  • virtual server - On the Internet, a virtual server is a server (computer and various server programs) at someone else's location that is shared by multiple Web site owners so that each owner can use and administer it as though they had complete control of the server.
  • visitor-based networking (VBN) - Visitor-based networking (VBN) is the provision of high-speed Internet access for mobile PC users in need of temporary service in public places.
  • VLAN (virtual LAN) - A VLAN (virtual LAN) is a subnetwork which can group together collections of devices on separate physical local area networks (LANs).
  • voice activation detection (VAD) - In Voice over IP (VOiP), voice activation detection (VAD) is a software application that allows a data network carrying voice traffic over the Internet to detect the absence of audio and conserve bandwidth by preventing the transmission of "silent packets" over the network.
  • vomit - Vomit (spelled all lower-case) is a Unix software utility that takes IP telephony packets captured by another Unix tool, tcpdump, and reassembles them into a Wave file that can be listened to over a computer's speakers.
  • VPD (vital product data) - VPD (vital product data) is information about a device that is stored on a computer's hard disk (or the device itself) that allows the device to be administered at a system or network level.
  • VPN (virtual private network) - A virtual private network (VPN) is programming that creates a safe, encrypted connection over a less secure network, such as the public internet.
  • VTAM (Virtual Telecommunications Access Method) - VTAM (Virtual Telecommunications Access Method) is an IBM application program interface (API) for communicating with telecommunication devices and their users.
  • W3C log - A W3C log is an access log for Web servers in which text files are generated containing data about each access request, including the source Internet Protocol (IP) address, the HTTP version, the browser type, the referrer page, and the timestamp.
  • WAN optimization (WAN acceleration) - WAN optimization -- also known as WAN acceleration -- is the category of technologies and techniques used to maximize the efficiency of data's flow across a wide area network (WAN), between organizations' centralized data centers and their remote locations.
  • WAP (Wireless Application Protocol) - WAP (Wireless Application Protocol) is a specification for a set of communication protocols to standardize the way that wireless devices, such as cellular telephones and radio transceivers, can be used for Internet access.
  • war dialer - A war dialer is a computer program used to identify the phone numbers that can successfully make a connection with a computer modem.
  • web server - A web server is software and hardware that uses HTTP (Hypertext Transfer Protocol) and other protocols to respond to client requests made over the World Wide Web.
  • webMethods - webMethods is a company that specializes in business process integration software for the enterprise.
  • wide-area file services (WAFS) - Wide-area file services (WAFS) is a storage technology that makes it possible to access a remote data center as though it were local.
  • Winbind - Winbind is a program that allows users in a heterogeneous network to log in using workstations that have either Unix or Windows NT operating systems.
  • Windows Server 2012 (WS 2012) - Windows Server 2012, formerly codenamed Windows Server 8, is the latest version of Windows Server.
  • Windows Server Core - Windows Server Core is a minimal installation option for the Windows Server operating system (OS) that has no GUI and only includes the components required to perform server roles and run applications.
  • Wingate - Wingate is a product that allows people on a small home network or a larger business network to share and control access to the Internet through a single computer connection.
  • Wired for Management (WfM) - Wired for Management (WfM) is a specification from Intel that allows the performance of certain computer configuration and maintenance functions over a network or dial-up connection.
  • wireless mesh network (WMN) - A wireless mesh network (WMN) is a mesh network created through the connection of wireless access points installed at each network user's locale.
  • WPAN (wireless personal area network) - A WPAN (wireless personal area network) is a personal area network - a network for interconnecting devices centered around an individual person's workspace - in which the connections are wireless.
  • X server - An X server is a server of connections to X terminals in a distributed network that uses the X Window System.
  • X terminal - An X terminal is typically a diskless computer especially designed to provide a low-cost user interface for applications that run in a network X server as part of a distributed X Window System.
  • X.25 - The X.25 protocol, adopted as a standard by the Consultative Committee for International Telegraph and Telephone (CCITT), is a commonly-used network protocol.
  • X.500 - X.500 Directory Service is a standard way to develop an electronic directory of people in an organization so that it can be part of a global directory available to anyone in the world with Internet access.
  • Xmodem - Xmodem is an error-correcting protocol for modem that was created in 1978 by Ward Christensen and became a de facto standard.
  • Xon/Xoff (X-on/X-off or XON/XOFF) - Xon/Xoff (sometimes written "X-on/X-off" or "XON/XOFF" and pronounced eks-AWN eks-AWF) is a protocol for controlling the flow of data between computers and other devices on an asynchronous serial connection.
  • Ymodem - Ymodem is an error-correcting protocol for a modem that uses larger data blocks for greater efficiency.
  • Z39.50 - Z39.50 is a standard communications protocol for the search and retrieval of bibliographic data in online databases.
  • zero touch provisioning (ZTP) - Zero touch provisioning (ZTP) is a switch feature that allows the devices to be provisioned and configured automatically, eliminating most of the manual labor involved with adding them to a network.
  • Zmodem protocol - Zmodem is an error-correcting protocol for modems.
  • zone - In general, a zone is an area of administration.
  • zoning - In a storage area network (SAN), zoning is the allocation of resources for device load balancing and for selectively allowing access to data only to certain users.

SearchCompliance

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

SearchHealthIT

SearchDisasterRecovery

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

  • cloud disaster recovery (cloud DR)

    Cloud disaster recovery (cloud DR) is a combination of strategies and services intended to back up data, applications and other ...

SearchStorage

Close