Browse Definitions:

SearchNetworking

IT professionals in almost every industry rely on SearchNetworking.com for industry news, technical tips and valuable best practices on routing, switching, network security, network/systems management, convergence/VoIP and wireless LANs, so they can keep their networks up to date and cope with constant change. Whether you are looking for advice on implementing a new technology or seeking new cost-saving strategies to improve the performance of your current network, SearchNetworking.com is an online helpdesk for IT managers and administrators.

View the complete archive of Enterprise Networking Technology Management news, research and expert advice.

Go to:  SearchNetworking

Recently on  SearchNetworking

Router security options advised following U.S. hacker alert

A rare government alert that Russian hackers are targeting routers in the United States and the United Kingdom has security experts debating router security options.

More Highlights
Definitions
  • OSI model (Open Systems Interconnection)

    OSI (Open Systems Interconnection) is a reference model for how applications communicate over a network.

  • presentation layer

    Residing at Layer 6 of the Open Systems Interconnection (OSI) communications model, the presentation layer ensures that the communications that pass through it are in the appropriate form for the recipient application.

  • 5G

    Fifth-generation wireless, or 5G, is the latest iteration of cellular technology, engineered to greatly increase the speed and responsiveness of wireless networks.

Browse Networking Topics

Data Center

Learn about data center networking considerations, including evolving data center network architectures and components, emerging data center network protocols and standards, and converged data center and storage networks.

Recent Definitions

  • network orchestration

    Network orchestration is a policy-driven approach to network automation that coordinates the hardware and software components a software application or service requires to run.

  • application delivery controller (ADC)

    An application delivery controller (ADC) is a network component that manages and optimizes how client machines connect to web and enterprise application servers.

  • Facebook Live

    Facebook Live is a feature for live broadcast of user videos from the Facebook mobile app.

Highlights

More Data Center Topics

Back to Top

Administration

Find general information and resources for network administration, including local area network (LAN) administration and Windows and Linux networking. Learn about the OSI Model and Cisco certifications as well as general career information and case studies. You'll also find our library of networking book chapter excerpts and tutorials on various networking topics.

Recent Definitions

  • OSI model (Open Systems Interconnection)

    OSI (Open Systems Interconnection) is a reference model for how applications communicate over a network.

  • presentation layer

    Residing at Layer 6 of the Open Systems Interconnection (OSI) communications model, the presentation layer ensures that the communications that pass through it are in the appropriate form for the recipient application.

  • Application layer

    Sitting at Layer 7 -- the very top of the Open Systems Interconnection (OSI) communications model -- the application layer provides services for an application program to ensure that effective communication with another application program on a network is possible.

Highlights

More Administration Topics

Back to Top

Infrastructure

Advancements in enterprise hardware and network protocols are allowing network pros to take advantage of new technologies to design and implement logical and physical LANs that contribute to business success. In our network infrastructure section, find out what you need to know to design your enterprise local area network infrastructure, including 10/100/100 Ethernet and switching technology, green networking initiatives, PoE, VLANs, and information on IP addressing, subnetting, TCP/IP and network routing protocols.

Recent Definitions

  • OSI model (Open Systems Interconnection)

    OSI (Open Systems Interconnection) is a reference model for how applications communicate over a network.

  • presentation layer

    Residing at Layer 6 of the Open Systems Interconnection (OSI) communications model, the presentation layer ensures that the communications that pass through it are in the appropriate form for the recipient application.

  • 5G

    Fifth-generation wireless, or 5G, is the latest iteration of cellular technology, engineered to greatly increase the speed and responsiveness of wireless networks.

Highlights

More Infrastructure Topics

Back to Top

Network Mgmt

Our network management resources provide you with information on end-to-end network performance, network monitoring, configuration management and applications management. You'll find advice on how to select the best network management software and how to integrate management tools with your network environment.

Recent Definitions

  • fault management

    Fault management is the component of network management concerned with detecting, isolating and resolving problems.

  • network configuration management (NCM)

    Network configuration management is the process of organizing and maintaining information about all the components of a computer network.

  • managed network services

    Managed network services are networking applications, functions and services that enterprises outsource to be remotely operated, monitored and maintained by a managed service provider (MSP).

Highlights

More Network Mgmt Topics

Back to Top

Network Security

Here you'll find network security resources for selecting and implementing security devices and maintaining secure networks. Find out how to design a secure network perimeter, where to locate a firewall and whether you need network access control.

Recent Definitions

  • firewall

    In computing, a firewall is software or firmware that enforces a set of rules about what data packets will be allowed to enter or leave a network.

  • VMware AppDefense

    VMware AppDefense is a data center security service designed to protect virtualized applications running in an enterprise data center in order to improve the protection and threat response performance of an enterprise security operations center (SOC).

  • deep packet inspection (DPI)

    Deep packet inspection (DPI) is an advanced method of examining and managing network traffic.

Highlights

More Network Security Topics

Back to Top

Virtualization

Virtualization is becoming less a buzzword and more just the way things are done, so networking professionals must be aware of the challenges (and benefits) virtualization presents for network configuration, performance and management. Get up to speed on the various types of virtualization such as server virtualization and storage virtualization; find out virtualization's effects on network performance. Find out how to transition to a virtualized environment and the best tools for managing network relationships between VMs and between virtual and physical devices in this section.

Recent Definitions

  • Virtual network functions (VNF)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is an initiative to virtualize network services traditionally run on proprietary, dedicated hardware.

  • logical unit number (LUN)

    A logical unit number (LUN) identifies one or more physical or virtual storage devices to a SCSI initiator in a host server to enable data exchange.

Highlights

More Virtualization Topics

Back to Top

WLANs

Wireless networking technology is ever-increasing in enterprise IT infrastructure. For information on what products you need to set up a wireless local area network (WLAN), navigate this WLAN section to answer your questions on wireless security encryption, equipment implementation, and wireless protocols and standards (like 802.11n). We also cover wireless network management tools that aid you in troubleshooting Wi-Fi problems.

Recent Definitions

  • 5G

    Fifth-generation wireless, or 5G, is the latest iteration of cellular technology, engineered to greatly increase the speed and responsiveness of wireless networks.

  • RFID (radio frequency identification)

    RFID (radio frequency identification) is a form of wireless communication that incorporates the use of electromagnetic or electrostatic coupling in the radio frequency portion of the electromagnetic spectrum to uniquely identify an object, animal or person.

  • spectrum analyzer

    A spectrum analyzer is a device that displays signal amplitude (strength) as it varies by signal frequency.

Highlights

More WLANs Topics

Back to Top

-ADS BY GOOGLE

SearchCompliance

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

SearchCloudProvider

  • cloud ecosystem

    A cloud ecosystem is a complex system of interdependent components that all work together to enable cloud services.

  • cloud services

    Cloud services is an umbrella term that may refer to a variety of resources provided over the internet, or to professional ...

  • uncloud (de-cloud)

    The term uncloud describes the action or process of removing applications and data from a cloud computing platform.

SearchSecurity

  • cyberextortion

    Cyberextortion is a crime involving an attack or threat of an attack coupled with a demand for money or some other response in ...

  • Cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

  • National Security Agency (NSA)

    The National Security Agency is the official U.S. cryptologic organization of the United States Intelligence Community under the ...

SearchHealthIT

  • Practice Fusion

    Practice Fusion Inc. is a San Francisco-based company that developed a free electronic health record (EHR) system available to ...

  • RHIA (Registered Health Information Administrator)

    An RHIA, or registered health information administrator, is a certified professional who oversees the creation and use of patient...

  • 21st Century Cures Act

    The 21st Century Cures Act is a wide-ranging healthcare bill that funds medical research and development, medical device ...

SearchDisasterRecovery

SearchStorage

  • Random Access Memory (RAM)

    Random Access Memory (RAM) is the hardware in a computing device where the operating system (OS), application programs and data ...

  • floating gate transistor (FGT)

    A floating gate transistor (FGT) is a complementary metal-oxide semiconductor (CMOS) technology capable of holding an electrical ...

  • bad block

    A bad block is an area of storage media that is no longer reliable for storing and retrieving data because it has been physically...

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close