Browse Definitions :

Networking

Definitions about networking including routing and switching vocabulary, telecom terminology and words about email, messaging and mobile.

Circuit switched services equipment and providers

Terms related to circuit switched services equipment and providers, including dedicated communications channel definitions and words and phrases about telecommunications.

  • service-level agreement (SLA)

    A service-level agreement (SLA) is a contract between a service provider and its customers that documents what services the provider will furnish and defines the service standards the provider is obligated to meet.

  • network switch

    A network switch is a hardware device that channels incoming data from multiple input ports to a specific output port that will take it toward its intended destination.

  • leased line

    A leased line is a bidirectional telephone line that has been rented for private voice, data exchange or telecommunication use.

View All Circuit switched services equipment and providers Definitions

Data transmission

Terms related to data transmission, including definitions about communication channels and words and phrases about point-to-point and point-to-multipoint data transfers.

  • OAuth

    OAuth (Open Authorization) is an open standard authorization framework for token-based authorization on the internet.

  • service-level agreement (SLA)

    A service-level agreement (SLA) is a contract between a service provider and its customers that documents what services the provider will furnish and defines the service standards the provider is obligated to meet.

  • WAN optimization (WAN acceleration)

    WAN optimization -- also known as WAN acceleration -- is the category of technologies and techniques used to maximize the efficiency of data's flow across a wide area network (WAN), between organizations' centralized data centers and their remote locations.

View All Data transmission Definitions Back to Top

Email and messaging

Terms related to email and messaging, including definitions about instant messenger and words and phrases about email servers, storage, spam and mobile access.

  • unified communications (UC)

    Unified communications (UC) is a framework for integrating various asynchronous and real-time communication tools.

  • contact center

    A contact center -- also referred to as a customer interaction center or e-contact center -- is a central point from which all customer interactions across various channels are managed.

  • email

    Email (electronic mail) is the exchange of computer-stored messages by telecommunication.

View All Email and messaging Definitions Back to Top

High-speed networks

Terms related to high-speed communication networks, including network and end-system architecture definitions and words and phrases about high-bandwidth and low-latency communication.

  • CenturyLink

    CenturyLink is an integrated telecommunications company that provides a wide variety of products and services to clients across the globe, including networking, cloud service and security solutions.

  • 5G

    Fifth-generation wireless (5G) is the latest iteration of cellular technology, engineered to greatly increase the speed and responsiveness of wireless networks.

  • fiber optics (optical fiber)

    Fiber optics, or optical fiber, refers to the medium and the technology associated with the transmission of information as light pulses along a glass or plastic strand or fiber.

View All High-speed networks Definitions Back to Top

Internet of Things

The Internet of Things (IoT) is a scenario in which objects, animals or people are provided with unique identifiers and the ability to transfer data over a network without requiring human interaction.

  • internet of things (IoT)

    The internet of things, or IoT, is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.

  • What Is RPA? Everything You Need to Know

    Robotic process automation technology is software that can be trained to mimic routine, labor-intensive tasks performed by humans.

  • MQTT (MQ Telemetry Transport)

    MQTT (MQ Telemetry Transport) is a lightweight messaging protocol that provides resource-constrained network clients with a simple way to distribute telemetry information.

View All Internet of Things Definitions Back to Top

LANs

Terms related to local area networks (LANs), including definitions about Ethernet and words and phrases about devices that share a common communications line or link.

  • dynamic spectrum access (dynamic spectrum management)

    Dynamic spectrum access (DSA), also referred to as dynamic spectrum management (DSM), is a set of spectrum utilization techniques that adjusts frequency in real time based on fluctuating circumstances.

  • wireline communication

    Wireline communication (also known as wired communication) is the transmission of information over a physical filament. Alternatively, communication technologies that transmit information over-the-air (OTA) are called wireless.

  • interconnection

    Interconnection is a strategy for ensuring that businesses can privately, securely and directly exchange digital information. An important goal of interconnection is to enable extremely high bandwidth exchanges with the lowest possible latency, at the lowest cost.

View All LANs Definitions Back to Top

Network hardware

Terms related to network hardware, including definitions about cables or file servers and words and phrases about routers and switches.

  • intrusion prevention system (IPS)

    An intrusion prevention system (IPS) is a network security and threat prevention tool.

  • keylogger (keystroke logger or system monitor)

    A keylogger, sometimes called a keystroke logger or system monitor, is a type of surveillance technology used to monitor and record each keystroke typed on a specific computer's keyboard.

  • WAN optimization (WAN acceleration)

    WAN optimization -- also known as WAN acceleration -- is the category of technologies and techniques used to maximize the efficiency of data's flow across a wide area network (WAN), between organizations' centralized data centers and their remote locations.

View All Network hardware Definitions Back to Top

Network software

Terms related to network software, including definitions about network monitoring and words and phrases about network administration.

  • Simple Network Management Protocol (SNMP)

    Simple Network Management Protocol (SNMP) is an application-layer protocol used to manage and monitor network devices and their functions.

  • Secure Shell (SSH)

    SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system administrators, a secure way to access a computer over an unsecured network.

  • intrusion prevention system (IPS)

    An intrusion prevention system (IPS) is a network security and threat prevention tool.

View All Network software Definitions Back to Top

Networking and communications

Terms related to networking and communications, including definitions about network protocols and words and phrases about data transmission.

  • traffic shaping

    Traffic shaping, also known as packet shaping, is a congestion management method that regulates network data transfer by delaying the flow of less important or less desired packets.

  • internet of things (IoT)

    The internet of things, or IoT, is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.

  • Microsoft Azure

    Microsoft Azure, formerly known as Windows Azure, is Microsoft's public cloud computing platform.

View All Networking and communications Definitions Back to Top

Routing and switching

Terms related to routers and switches, including definitions about hubs and words and phrases about packet-switched networks.

  • Martian address (Martian packet)

    A Martian address is a source or destination IP address that apparently does not exist on Planet Earth and is, thus, invalid and/or non-routable.

  • edge router

    An edge router is a specialized router located at a network boundary that enables an internal network to connect to external networks.

  • Multiprotocol Label Switching (MPLS)

    Multiprotocol Label Switching (MPLS) is a protocol-agnostic routing technique designed to speed up and shape traffic flows across enterprise wide area and service provider networks.

View All Routing and switching Definitions Back to Top

Smart grid

Terms related to smart grids, including definitions about utility electricity delivery systems and words and phrases about smart meters and distributing, monitoring and billing electrical power.

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard, or AES, is a symmetric block cipher chosen by the U.S. government to protect classified information and is implemented in software and hardware throughout the world to encrypt sensitive data.

  • internet of things (IoT)

    The internet of things, or IoT, is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.

  • bandwidth

    Network bandwidth is the capacity of a wired or wireless network communications link to transmit the maximum amount of data from one point to another over a computer network or internet connection in a given amount of time -- usually, one second.

View All Smart grid Definitions Back to Top

Telecom

Terms related to telecom, including definitions about telecommunication service providers and words and phrases about voice, video and Internet communication.

  • CenturyLink

    CenturyLink is an integrated telecommunications company that provides a wide variety of products and services to clients across the globe, including networking, cloud service and security solutions.

  • Kari's law

    Kari's law is legislation in the United States that requires multi-line telephone systems (MLTS) to route 9-1-1 emergency service calls through the phone system automatically. Kari's law mandates that the electronics and software used in multi-line systems support direct-dial-to-emergency-services, even if the system normally requires the caller to enter an additional digit for an outside line.

  • telecommunications (telecom)

    Telecommunications is the transmission of data, voice and video over significant distances by electronic means that use a wide variety of networks and media.

View All Telecom Definitions Back to Top

VoIP

Terms related to voice over IP (VoIP), including definitions about communication protocols and words and phrases about making phone calls over the Internet.

  • unified communications (UC)

    Unified communications (UC) is a framework for integrating various asynchronous and real-time communication tools.

  • static IP address

    A static IP address is a 32 bit number that is assigned to a computer to be its address on the internet.

  • voice over LTE (VoLTE)

    Voice over LTE (VoLTE) is a digital packet technology that uses 4G LTE networks to route voice traffic and transmit data.

View All VoIP Definitions Back to Top

Wireless LANs

Terms related to wireless LANs, including definitions about Wi-Fi and words and phrases about wireless access points, wireless controllers, wireless LAN security and WLAN configuration.

  • Wi-Fi Pineapple

    A Wi-Fi Pineapple is a wireless auditing platform from Hak5 that allows network security administrators to conduct penetration tests.

  • bandwidth

    Network bandwidth is the capacity of a wired or wireless network communications link to transmit the maximum amount of data from one point to another over a computer network or internet connection in a given amount of time -- usually, one second.

  • wireless ad-hoc network (WANET)

    A wireless ad-hoc network (WANET) is a type of local area network (LAN) that is built spontaneously to enable two or more wireless devices to be connected to each other without requiring a central device, such as a router or access point.

View All Wireless LANs Definitions Back to Top

Wireless technologies

Terms related to wireless technologies, including definitions about wireless devices and words and phrases about radio, microwave and infrared communication.

  • 5G

    Fifth-generation wireless (5G) is the latest iteration of cellular technology, engineered to greatly increase the speed and responsiveness of wireless networks.

  • wireless ad-hoc network (WANET)

    A wireless ad-hoc network (WANET) is a type of local area network (LAN) that is built spontaneously to enable two or more wireless devices to be connected to each other without requiring a central device, such as a router or access point.

  • pervasive computing (ubiquitous computing)

    Pervasive computing, also called ubiquitous computing, is the growing trend of embedding computational capability (generally in the form of microprocessors) into everyday objects to make them effectively communicate and perform useful tasks in a way that minimizes the end user's need to interact with computers as computers.

View All Wireless technologies Definitions Back to Top

-ADS BY GOOGLE

SearchCompliance

  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard, or AES, is a symmetric block cipher chosen by the U.S. government to protect classified ...

  • intrusion detection system (IDS)

    An intrusion detection system (IDS) is a system that monitors network traffic for suspicious activity and alerts when such ...

  • Secure Shell (SSH)

    SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system ...

SearchHealthIT

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks or ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

Close