Browse Definitions :

Routing and switching

Terms related to routers and switches, including definitions about hubs and words and phrases about packet-switched networks.

SDN - XOR

  • SDN controller (software-defined networking controller) - An SDN controller is an application in a software-defined networking (SDN) architecture that manages flow control for improved network management and application performance.
  • segment routing - Segment routing is a computer networking process used by networking and traffic engineering professionals that organizes collections of information, or packets, to follow a linear set of instructions.
  • service chaining - Service chaining, in an information technology (IT) context, is the addition of software-defined networking (SDN) capabilities in a specific sequence.
  • Session layer - In the Open Systems Interconnection (OSI) communications model, the session layer resides at Layer 5 and manages the setup and teardown of the association between two communicating endpoints.
  • session-based routing - Session-based routing is a type of routing architecture that is application-centric and designed to route entire sessions instead of individual packets.
  • short message service center (SMSC) - A short message service center (SMSC) is the portion of a wireless network that handles SMS operations, such as routing, forwarding and storing incoming text messages on their way to desired endpoints.
  • Signalling Connection Control Part (SCCP) - Signalling Connection Control Part (SCCP) is a portion of International Telecommunication Union (ITU) recommendation Q.
  • smart home hub (home automation hub) - A smart home hub is hardware or software that connects devices on a home automation network and controls communications among them.
  • SMS gateway - An SMS gateway is a website that allows users to send SMS messages from a web browser to people within the cell served by that gateway.
  • softswitch - Softswitch (software switch) is a generic term for any open application program interface (API) software used to bridge a public switched telephone network (PSTN) and Voice over Internet Protocol (VOiP) by separating the call control functions of a phone call from the media gateway (transport layer).
  • software-defined networking (SDN) - Software-defined networking (SDN) is a network architecture that aims to make data center networks agile and flexible.
  • split horizon - Split horizon is a method of preventing a routing loop in a network.
  • Squid proxy server - Squid is a Unix-based proxy server that caches Internet content closer to a requestor than its original point of origin.
  • subnet mask (subnetting) - A subnet mask is a 32- or 128-bit number that segments an existing IP address in a TCP/IP network and divides that address into discrete network and host addresses.
  • supernetting or Classless Inter-Domain Routing (CIDR) - Supernetting, also called Classless Inter-Domain Routing (CIDR), is a way to aggregate multiple Internet addresses of the same class.
  • switch-on-a-chip (SOC) - A switch-on-a-chip (SOC) is a network - typically a storage network - switch (a device that channels incoming data flow from any of multiple input ports to the output port appropriate for its destination) that is built into a single microchip (integrated circuit).
  • switched virtual circuit (SVC) - In a network, a switched virtual circuit (SVC) is a temporary virtual circuit that is established and maintained only for the duration of a data transfer session.
  • switching fabric - Switching fabric is the combination of hardware and software that moves data coming in to a network node out by the correct port (door) to the next node in the network.
  • Technical Office Protocol (TOP) - Technical Office Protocol (TOP), also called Technical and Office Protocol, is a set of protocols intended for networks that perform distributed information processing in business offices.
  • top-of-rack switching - Top-of-rack switching refers to a distributed data center architecture where one or more Ethernet switches is installed in a rack, then uplinked using high-bandwidth fiber optic connections to a central, high-density distribution point.
  • unified computing system (UCS) - A unified computing system (UCS) is is a converged data center architecture that integrates computing, networking and storage resources to increase efficiency and enable centralized management.
  • variable-length subnet mask (VLSM) - Definition: Learn what a variable-length subnet mask (VLSM) is and how it allows network engineers to reduce the number of wasted IP addresses in each subnet.
  • vCPE (virtual customer premises equipment) - Virtual customer premises equipment (also referred to as vCPE or cloud CPE) are enterprise network services delivered through software.
  • white box switch - A white box switch is built on a low-cost, bare metal device that runs on merchant silicon.
  • wildcard mask - A wildcard mask is a sequence of numbers that streamlines packet routing within the subnets of a proprietary network.
  • wireless router - A wireless router is a device in a WLAN (wireless local area network) that determines the next network point to which a packet should be forwarded toward its destination.
  • XORP (Extensible Open Router Platform) - XORP (Extensible Open Router Platform) is a project devoted to the creation of a system for open source network routing.

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • cybersecurity insurance (cybersecurity liability insurance)

    Cybersecurity insurance, also called cyber liability insurance or cyber insurance, is a contract that an entity can purchase to ...

  • phishing

    Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication ...

  • cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

SearchHealthIT

SearchDisasterRecovery

  • disaster recovery plan (DRP)

    A disaster recovery plan (DRP) is a documented, structured approach that describes how an organization can quickly resume work ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

SearchStorage

  • NVMe over Fabrics (NVMe-oF)

    NVMe over Fabrics, also known as NVMe-oF and non-volatile memory express over fabrics, is a protocol specification designed to ...

  • logical unit number (LUN)

    A logical unit number (LUN) is a unique identifier for designating an individual or collection of physical or virtual storage ...

  • CIFS (Common Internet File System)

    CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an ...

Close