Browse Definitions :

Networking

Definitions about networking including routing and switching vocabulary, telecom terminology and words about email, messaging and mobile.

Circuit switched services equipment and providers

Terms related to circuit switched services equipment and providers, including dedicated communications channel definitions and words and phrases about telecommunications.

  • time-division multiplexing (TDM)

    Time-division multiplexing (TDM) is a method of putting multiple data streams in a single signal by separating the signal into many segments, each having a very short duration.

  • teleconference

    A teleconference is a live audio or audio-visual meeting with two or more participants.

  • jitter

    Jitter is any deviation in, or displacement of, the signal pulses in a high-frequency digital signal.

View All Circuit switched services equipment and providers Definitions

Data transmission

Terms related to data transmission, including definitions about communication channels and words and phrases about point-to-point and point-to-multipoint data transfers.

  • Remote Direct Memory Access (RDMA)

    Remote Direct Memory Access (RDMA) is a technology that enables two networked computers to exchange data in main memory without relying on the processor, cache or operating system of either computer.

  • chatty protocol

    A chatty protocol is an application or routing protocol requiring a client or server to wait for an acknowledgment before transmitting data again.

  • downloading

    Downloading is the transmission of a file or data from one computer to another over a network, usually from a larger server to a user device.

View All Data transmission Definitions Back to Top

Email and messaging

Terms related to email and messaging, including definitions about instant messenger and words and phrases about email servers, storage, spam and mobile access.

  • email archiving

    Email archiving is a systematic approach to saving and protecting the data contained in emails to enable fast retrieval.

  • at sign (address sign or @)

    On the Internet, @ (pronounced "at" or "at sign" or "address sign") is the symbol in an e-mail address that separates the name of the user from the user's Internet address, as in this hypothetical e-mail address example: [email protected]

  • MIME (Multipurpose Internet Mail Extensions)

    MIME, or Multipurpose Internet Mail Extensions, is an extension of the original email protocol.

View All Email and messaging Definitions Back to Top

High-speed networks

Terms related to high-speed communication networks, including network and end-system architecture definitions and words and phrases about high-bandwidth and low-latency communication.

  • fiber optics (optical fiber)

    Fiber optics, or optical fiber, refers to the technology that transmits information as light pulses along a glass or plastic fiber.

  • internet metering

    Internet metering is a service model in which an internet service provider (ISP) keeps track of bandwidth use and charges users accordingly.

  • What is 5G?

    Fifth-generation wireless (5G) is the latest iteration of cellular technology. Unlike 4G, which requires large, high-power cell towers to radiate signals over longer distances, 5G wireless signals are transmitted through large numbers of small cell stations located on places like light poles or building roofs.

View All High-speed networks Definitions Back to Top

Internet of Things

The Internet of Things (IoT) is a scenario in which objects, animals or people are provided with unique identifiers and the ability to transfer data over a network without requiring human interaction.

  • What is fog computing?

    Fog computing is a decentralized computing infrastructure in which data, compute, storage and applications are located somewhere between the data source and the cloud.

  • ambient intelligence (AmI)

    Ambient intelligence (AmI) is the element of a pervasive computing environment that enables it to interact with and respond appropriately to the humans in that environment.

  • What is internet of things (IoT)?

    The internet of things, or IoT, is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.

View All Internet of Things Definitions Back to Top

LANs

Terms related to local area networks (LANs), including definitions about Ethernet and words and phrases about devices that share a common communications line or link.

  • fixed-length subnet mask (FLSM)

    A fixed-length subnet mask (FLSM) refers to a type of enterprise or provider networking where a block of IP addresses is divided into multiple subnets of equal length (i.e., an equal number of IP addresses).

  • virtual network adapter

    A virtual network adapter is software that operates like a physical network adapter within the host operating system (OS) or through an application installed on the endpoint or server.

  • 10BASE-T

    10BASE-T is an Ethernet standard for local area networks and one of several physical media specified in the Institute of Electrical and Electronics Engineers (IEEE) 802.3 standard.

View All LANs Definitions Back to Top

Network hardware

Terms related to network hardware, including definitions about cables or file servers and words and phrases about routers and switches.

  • host bus adapter (HBA)

    A host bus adapter (HBA) is a circuit board or integrated circuit adapter that connects a host system, such as a server, to a storage or network device.

  • full-duplex

    Full-duplex data transmission means that data can be transmitted in both directions on a signal carrier at the same time.

  • Seebeck effect

    The Seebeck effect is a phenomenon in which a temperature difference between two dissimilar electrical conductors or semiconductors produces a voltage difference between the two substances.

View All Network hardware Definitions Back to Top

Network software

Terms related to network software, including definitions about network monitoring and words and phrases about network administration.

  • HELLO packet

    A HELLO packet is a special data packet (message) that is sent out periodically from a router to establish and confirm network adjacency relationships to other routers in the Open Shortest Path First (OSPF) communications protocol.

  • Remote Procedure Call (RPC)

    Remote Procedure Call (RPC) is a protocol that one program can use to request a service from a program located in another computer on a network without having to understand the network's details.

  • NBMA (non-broadcast multiple access)

    Non-broadcast multiple access (NBMA) is one of four network types in the Open Shortest Path First (OSPF) communications protocol.

View All Network software Definitions Back to Top

Networking and communications

Terms related to networking and communications, including definitions about network protocols and words and phrases about data transmission.

  • Windows Server Update Services (WSUS)

    Windows Server Update Services (WSUS) is a Windows server role that can plan, manage and deploy updates, patches and hotfixes for Windows servers, client operating systems and other Microsoft software.

  • chatty protocol

    A chatty protocol is an application or routing protocol requiring a client or server to wait for an acknowledgment before transmitting data again.

  • IDSL

    IDSL is a hybrid of a digital subscriber line (DSL) and integrated services digital network (ISDN) technology that transmits data slightly faster than ISDN but much slower than most DSL services.

View All Networking and communications Definitions Back to Top

Routing and switching

Terms related to routers and switches, including definitions about hubs and words and phrases about packet-switched networks.

  • HELLO packet

    A HELLO packet is a special data packet (message) that is sent out periodically from a router to establish and confirm network adjacency relationships to other routers in the Open Shortest Path First (OSPF) communications protocol.

  • route summarization (route aggregation)

    Route summarization -- also known as route aggregation -- is a method to minimize the number of routing tables in an Internet Protocol (IP) network.

  • Variable Length Subnet Mask (VLSM)

    Variable Length Subnet Mask (VLSM) is a subnet -- a segmented piece of a larger network -- design strategy where all subnet masks can have varying sizes.

View All Routing and switching Definitions Back to Top

Smart grid

Terms related to smart grids, including definitions about utility electricity delivery systems and words and phrases about smart meters and distributing, monitoring and billing electrical power.

  • charge (electric charge)

    In physics, charge, also known as electric charge, electrical charge, or electrostatic charge and symbolized q, is a characteristic of a unit of matter that expresses the extent to which it has more or fewer electrons than protons.

  • carbon offset

    A carbon offset is a credit that a person or organization can buy to decrease its carbon footprint.

  • charge-coupled device

    A charge-coupled device (CCD) is a light-sensitive integrated circuit that captures images by converting photons to electrons.

View All Smart grid Definitions Back to Top

Telecom

Terms related to telecom, including definitions about telecommunication service providers and words and phrases about voice, video and Internet communication.

  • call center

    A call center is a centralized department that handles inbound and outbound calls from current and potential customers.

  • satellite

    A satellite is any object that orbits something else, as, for example, the Earth orbits the sun.

  • VoIP caller ID (voice over Internet Protocol caller identification)

    VoIP caller ID (voice over Internet Protocol caller identification) is a caller ID application for VoIP phones that works in the same way as caller ID on a conventional telephone line.

View All Telecom Definitions Back to Top

VoIP

Terms related to voice over IP (VoIP), including definitions about communication protocols and words and phrases about making phone calls over the Internet.

View All VoIP Definitions Back to Top

Wireless LANs

Terms related to wireless LANs, including definitions about Wi-Fi and words and phrases about wireless access points, wireless controllers, wireless LAN security and WLAN configuration.

  • SIP trunking (Session Initiation Protocol trunking)

    Session Initiation Protocol trunking is a service offered by a communications service provider that uses the protocol to provision voice over IP connectivity between an on-premises phone system and the public switched telephone network.

  • VPN (virtual private network)

    A virtual private network (VPN) is a service that creates a safe, encrypted online connection.

  • Wired Equivalent Privacy (WEP)

    Wired Equivalent Privacy (WEP) is a security protocol, specified in the IEEE Wireless Fidelity (Wi-Fi) standard, 802.11b.

View All Wireless LANs Definitions Back to Top

Wireless technologies

Terms related to wireless technologies, including definitions about wireless devices and words and phrases about radio, microwave and infrared communication.

  • harmonic

    A harmonic is a wave or signal whose frequency is an integral (whole number) multiple of the frequency of the same reference signal or wave.

  • satellite

    A satellite is any object that orbits something else, as, for example, the Earth orbits the sun.

  • Global Positioning System (GPS)

    The GPS (Global Positioning System) is a 'constellation' of approximately 30 well-spaced satellites that orbit the Earth and make it possible for people with ground receivers to pinpoint their geographic location.

View All Wireless technologies Definitions Back to Top
SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • Twofish

    Twofish is a symmetric-key block cipher with a block size of 128 bits and variable-length key of size 128, 192 or 256 bits.

  • walled garden

    On the internet, a walled garden is an environment that controls the user's access to network-based content and services.

  • potentially unwanted program (PUP)

    A potentially unwanted program (PUP) is a program that may be unwanted, despite the possibility that users consented to download ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • Remote Direct Memory Access (RDMA)

    Remote Direct Memory Access (RDMA) is a technology that enables two networked computers to exchange data in main memory without ...

  • storage (computer storage)

    Data storage is the collective methods and technologies that capture and retain digital information on electromagnetic, optical ...

  • storage medium (storage media)

    In computers, a storage medium is a physical device that receives and retains electronic data for applications and users and ...

Close