Skip to content
Glossary of Networking Terms

Networking Glossary of Terms

  1. 10/100/1000Base-T: A set of Ethernet standards that define the maximum transmission speed of data over twisted-pair copper cables, with 10Base-T supporting a maximum speed of 10 Mbps, 100Base-T supporting a maximum speed of 100 Mbps, and 1000Base-T supporting a maximum speed of 1 Gbps. Example: An Ethernet cable used to connect a computer to a local area network (LAN).

  2. Access Point (AP): A device that connects wireless devices to a wired network, allowing them to access network resources. Example: A wireless router that provides Wi-Fi access to devices in a home or office.

  3. Active-active Failover: A system configuration in which two or more systems are actively running and sharing the workload, with each system capable of taking over for the other in the event of a failure. Example: A high-availability cluster of servers, where each server is actively running and sharing the workload, and if one server fails, the others take over automatically.

  4. Active Directory (AD): A directory service provided by Microsoft that stores information about users, computers, and other network resources in a centralized database, allowing administrators to manage and secure a Windows-based network. Example: A centralized database of user accounts and network resources used to manage and secure a Windows-based network.

  5. Application Delivery Controller (ADC): A device or software that distributes network traffic across multiple servers or network resources to optimize performance and availability for applications. Example: A load balancer that optimizes the delivery of web applications over a network by managing traffic and providing security features.

  6. Application Delivery Network (ADN): A network infrastructure that provides acceleration, optimization, and security features for cloud-based applications. Example: A cloud-based network infrastructure that uses caching and compression techniques to improve the performance of applications running in the cloud.

  7. Bandwidth: The maximum amount of data that can be transmitted over a network in a given period of time. Example: The amount of data that can be transmitted over a fiber-optic cable with a capacity of 10 Gbps.

  8. Bandwidth Throttling: The intentional slowing down of network traffic to reduce congestion or limit the amount of data that can be transmitted over a network. Example: An Internet service provider limiting the download speed of a customer's connection during times of peak usage.

  9. Blade Server: A server that uses a modular design to reduce space and energy requirements by packing multiple servers into a single chassis. Example: A blade server chassis containing multiple blade servers that are hot-swappable and share common power and cooling infrastructure.

  10. Border Gateway Protocol (BGP): A routing protocol used to exchange routing information between Internet service providers (ISPs) and other large networks. Example: BGP is used to route traffic between different ISPs and networks to ensure that data is delivered efficiently and reliably across the Internet.

  11. Borderless Network: A network infrastructure that provides secure and seamless connectivity to users and devices from any location. Example: A borderless network that allows employees to securely access corporate resources from any device and any location.

  12. Bridge: A network device that connects two or more network segments together and forwards data between them. Example: A bridge used to connect two separate LANs in a corporate network.

  13. Cloud Computing: A computing model that allows users to access computing resources, such as servers, storage, and applications, over the Internet. Example: A company using cloud computing to host its website and store its data on remote servers.

  14. Cloud Networking: A network infrastructure that provides connectivity and security features for cloud-based applications and services. Example: A virtual private network (VPN) that allows users to securely access cloud-based applications and data.

  15. Cloud Storage: A data storage model that allows users to store and access data over the Internet, typically using a third-party provider. Example: A company using a cloud storage service to store and share files across multiple devices and locations.

  16. Content Delivery Network (CDN): A distributed network of servers that provides faster delivery of web content by caching and delivering it from the server closest to the user. Example: A CDN used to deliver streaming video to users around the world, with the video content cached and delivered from servers in different geographic locations.

  17. Data Center: A facility that houses computer systems and other equipment used to store, process, and manage data. Example: A large data center used by a cloud computing provider to host its servers and provide computing resources to its customers.

  18. Data Center Virtualization: A technique used to create multiple virtual servers or machines on a single physical server, allowing for greater efficiency and resource utilization. Example: A company using virtualization software to create multiple virtual servers on a single physical server in its data center.

  19. Distributed Denial of Service (DDoS): A cyberattack that floods a network or server with traffic, rendering it unavailable to users. Example: A company's website being taken offline by a DDoS attack that floods it with traffic from multiple sources.

  20. Domain Name System Security Extensions (DNSSEC): A set of security extensions to the DNS protocol that provides authentication and integrity verification of DNS data. Example: A company using DNSSEC to protect its domain names and ensure that users are directed to the correct website and not a fake or fraudulent site.

  21. Dynamic Host Configuration Protocol (DHCP): A protocol used to assign IP addresses and other network configuration information to devices on a network. Example: A DHCP server automatically assigning IP addresses to computers and other devices on a local network.

  22. Edge Computing: A computing model that brings processing and storage closer to the source of data, rather than relying on centralized data centers. Example: A manufacturing plant using edge computing to process sensor data in real-time, rather than sending it to a central data center for processing.

  23. Ethernet: A family of networking technologies used to transmit data over a local area network (LAN). Example: A computer connected to a LAN using an Ethernet cable.

  24. Ethernet Frame: A data structure used to organize data transmitted over an Ethernet network. Example: An Ethernet frame containing the data payload and header information used to route the data to its destination.

  25. Ethernet Switching: A method of forwarding network traffic based on the MAC addresses of the devices connected to a network. *Example: An Ethernet switch forwarding data packets to their destination based on the MAC addresses of the devices

  26. Fiber Channel: A high-speed networking technology used to connect servers, storage devices, and other components in a storage area network (SAN). Example: A company using a Fiber Channel network to connect its servers and storage devices in a data center.

  27. Fiber Channel over Ethernet (FCoE): A technology that allows Fiber Channel traffic to be encapsulated and transmitted over Ethernet networks. Example: A company using FCoE to consolidate its storage and networking infrastructure and reduce costs.

  28. Firewall: A network security device that monitors and controls incoming and outgoing network traffic based on predefined security rules. Example: A firewall used to block unauthorized access to a company's network and prevent the spread of malware.

  29. Firmware: Software that is permanently stored in a hardware device, such as a router or switch, and controls its operation. Example: The firmware on a router that controls its routing functions and network management.

  30. Gateway: A device that connects two different networks and translates between different network protocols. Example: A router used as a gateway between a local area network (LAN) and the Internet.

  31. Guest Virtual Machine (Guest VM): A virtual machine that runs on a host server and provides a virtualized environment for guest operating systems. Example: A virtual machine running on a host server to provide a separate and isolated environment for testing new software.

  32. High Availability (HA): A system or component that is designed to provide continuous operation and minimize downtime. Example: A high-availability cluster of servers that automatically takes over if one of the servers fails, ensuring continuous operation of critical applications.

  33. Hub: A network device that connects multiple devices together and forwards network traffic to all devices connected to it. Example: A hub used to connect multiple computers together in a home network.

  34. Hyper-converged Infrastructure (HCI): A data center architecture that combines compute, storage, and networking resources into a single software-defined platform. Example: A company using an HCI platform to virtualize its data center and improve scalability and performance.

  35. InfiniBand: A high-speed networking technology used in data centers to connect servers, storage devices, and other components. Example: A supercomputer using InfiniBand to provide high-speed interconnectivity between its processors and memory.

  36. Internet of Things (IoT): A network of physical devices, vehicles, and other objects that are embedded with sensors, software, and network connectivity to collect and exchange data. Example: Smart home devices, such as thermostats and security cameras, that can be controlled and monitored remotely over the Internet.

  37. Internet Service Provider (ISP): A company that provides Internet access to customers, typically through a wired or wireless network. Example: A cable company that provides broadband Internet access to homes and businesses.

  38. Intrusion Detection System (IDS): A network security device that monitors network traffic for signs of unauthorized access or malicious activity. Example: An IDS used to detect and alert administrators to potential security threats, such as attempts to access a network using stolen credentials.

  39. IP Address: A unique numerical identifier assigned to devices on a network that enables them to communicate with other devices on the same network or over the Internet. Example: The IP address assigned to a computer on a local area network.

  40. Jumbo Frame: A larger-than-normal Ethernet frame used to improve network performance by reducing overhead and increasing data throughput. Example: A network interface card (NIC) configured to use Jumbo Frames to transmit data more efficiently over a network.

  41. Load Balancer: A device or software that distributes network traffic across multiple servers or network resources to optimize performance and availability for applications. Example: A load balancer that distributes incoming web traffic across multiple servers to optimize the delivery of a web application.

  42. Load Balancing: The process of distributing network traffic across multiple servers or network resources to optimize performance and availability for applications. Example: Load balancing used by a web-based application to evenly distribute traffic between multiple servers to improve the application's performance.

  43. Media Access Control (MAC) Address: A unique identifier assigned to network interface cards (NICs) that enables devices on a network to communicate with each other. Example: The MAC address assigned to the network interface card of a computer on a local area network.

  44. Modem: A device that converts digital signals to analog signals and vice versa to enable communication between devices over telephone lines or cable lines. Example: A modem used to connect a computer to the Internet over a telephone line.

  45. Multiprotocol Label Switching (MPLS): A protocol used to direct data packets through a network based on labels rather than network addresses, allowing for faster and more efficient routing. Example: An MPLS network used by a large corporation to provide high-speed, secure connectivity between its branch offices.

  46. NAT (Network Address Translation): A technique used to map one or more private IP addresses to a single public IP address, enabling multiple devices to access the Internet through a single IP address. Example: A router using NAT to allow multiple devices on a home network to access the Internet using a single public IP address.

  47. Network Address Translation (NAT): A technique used to map one or more private IP addresses to a single public IP address, enabling multiple devices to access the Internet through a single IP address. Example: A router using NAT to allow multiple devices on a home network to access the Internet using a single public IP address.

  48. Network Attached Storage (NAS): A data storage device that connects to a network and provides file-based storage to clients on the network. Example: A NAS device used by a small business to store and share files between employees over a local area network.

  49. Network Function Chaining (NFC): A technique used to chain together multiple network functions, such as firewalls, load balancers, and intrusion detection systems, into a single service chain to improve network efficiency and flexibility. Example: An NFC-enabled network that chains together multiple network functions to provide a secure and efficient network infrastructure.

  50. Network Function Virtualization (NFV): A technique used to virtualize network functions, such as firewalls and routers, and run them on virtualized infrastructure rather than physical hardware. Example: A company using NFV to virtualize its network functions and run them on a virtualized infrastructure, reducing costs and improving scalability.

  51. Network Interface Card (NIC): A hardware component that connects a computer or other device to a network. Example: A network interface card installed in a desktop computer to connect it to a local area network.

  52. Network Load Balancing (NLB): A technique used to distribute network traffic across multiple servers or network resources to improve performance and availability. Example: Network load balancing used by a web server farm to distribute incoming web traffic evenly across multiple servers to improve the performance and availability of a web application.

  53. Network Topology: The physical or logical layout of a network, including its devices, connections, and protocols. *Example: A star network topology used in a small office network, with each computer connected

  54. Open Network Automation Platform (ONAP): An open-source platform used to automate and manage network services in a software-defined networking (SDN) environment. Example: A telecommunications provider using ONAP to automate the provisioning and management of its network services.

  55. Open Shortest Path First (OSPF): A routing protocol used to determine the shortest path between two network nodes and exchange routing information in a network. Example: A large enterprise network using OSPF to dynamically route traffic between its different locations.

  56. OpenFlow: A protocol used in software-defined networking (SDN) to enable the control of network switches and routers by a centralized controller. Example: An SDN implementation using OpenFlow to control and manage network switches and routers from a centralized controller.

  57. Packet: A unit of data transmitted over a network that contains both data and header information used for routing and other network functions. Example: A packet containing data from a web page request and header information used to route the data to its destination.

  58. Packet Switching: A networking technique that breaks data into small packets and sends them individually across a network, with each packet following its own path to its destination. Example: The Internet using packet switching to transmit data between different devices and networks.

  59. Port Mirroring: A technique used to copy network traffic from one network port to another, allowing for network monitoring and analysis. Example: A network administrator using port mirroring to monitor network traffic for signs of suspicious activity or performance issues.

  60. Power Distribution Unit (PDU): A device used to distribute electrical power to multiple devices in a data center or server room. Example: A PDU used to distribute electrical power to servers and networking equipment in a data center.

  61. Power over Ethernet (PoE): A technology that allows electrical power to be transmitted over Ethernet cables, enabling devices to be powered without requiring a separate power source. Example: An IP phone powered by Power over Ethernet, receiving both data and power over a single Ethernet cable.

  62. Protocol: A set of rules and standards used to enable communication between devices on a network. Example: The TCP/IP protocol used for communication between devices on the Internet.

  63. Quality of Experience (QoE): The overall satisfaction of a user with a particular application or service based on their experience using it. Example: A company using QoE metrics to measure and improve the performance and usability of its web-based applications.

  64. Quality of Service (QoS): A technique used to prioritize network traffic based on the type and importance of the data being transmitted. Example: A company using QoS to prioritize voice and video traffic over data traffic on its network to ensure high-quality voice and video communications.

  65. Redundancy: The use of backup components or systems to ensure continuous operation and minimize downtime in the event of a failure. Example: A company using redundant power supplies and backup generators to ensure continuous operation of its critical systems.

  66. Remote Access: The ability to access a network or computer system from a remote location over the Internet or another network. Example: An employee using remote access to connect to a company's network and access files and applications from a remote location.

  67. Router: A networking device that connects multiple networks together and forwards data between them. Example: A router used to connect a local area network to the Internet.

  68. SAN (Storage Area Network): A high-speed network used to connect servers and storage devices to a shared storage resource. *Example: A company using a SAN to provide centralized storage for its servers, enabling them to share data and resources more efficiently.*

  69. Server: A computer or other device that provides data, applications, or other resources to client devices over a network. Example: A web server used to host and deliver a website to users over the Internet.

  70. Simple Network Management Protocol (SNMP): A protocol used to manage and monitor network devices and systems. Example: A network administrator using SNMP to monitor and manage the performance and availability of network devices, such as routers and switches.

  71. Software-Defined Access (SD-Access): A network architecture that uses software-defined networking (SDN) to automate and simplify access control and network segmentation. Example: A large organization using SD-Access to automate and simplify access control for its employees and guests, improving security and reducing management overhead.

  72. Software-Defined Networking (SDN): A network architecture that uses software to centrally manage and control network devices and resources. Example: A cloud provider using SDN to manage and control the network infrastructure for its customers, providing a highly scalable and efficient network service.

  73. Software-Defined Security (SD-Security): A network security architecture that uses software to automate and orchestrate security functions, such as firewalls and intrusion detection systems. Example: A company using SD-Security to automate and orchestrate its network security functions, improving security and reducing management overhead.

  74. Software-Defined Storage (SDS): A storage architecture that uses software to manage and virtualize storage resources, enabling greater scalability and flexibility. Example: A company using SDS to virtualize its storage resources and provide a highly scalable and efficient storage service.

  75. Storage Area Network (SAN): A high-speed network used to connect servers and storage devices to a shared storage resource. Example: A company using a SAN to provide centralized storage for its servers, enabling them to share data and resources more efficiently.

  76. Switch: A networking device that connects multiple devices together and forwards network traffic to its intended destination. Example: A switch used to connect multiple computers together in a local area network.

  77. Thin Client: A computer or other device that relies on a central server or cloud-based service to provide applications and data to the user. Example: A thin client used in a virtual desktop infrastructure (VDI) environment, relying on a central server to provide desktop applications and data to the user.

  78. Transmission Control Protocol/Internet Protocol (TCP/IP): The set of protocols used for communication between devices on the Internet. Example: A web browser using the TCP/IP protocol to request and receive data from a web server over the Internet.

  79. Unified Communications (UC): The integration of multiple communication channels, such as voice, video, and instant messaging, into a single platform. Example: A company using a UC platform to provide its employees with a single platform for communication and collaboration, enabling them to work more efficiently and effectively.

  80. Unified Threat Management (UTM): A network security appliance that combines multiple security functions, such as firewall and intrusion detection, into a single device. Example: A UTM appliance used by a small business to provide comprehensive network security, including firewall, antivirus, and intrusion detection, in a single device.

  81. Virtual Local Area Network (VLAN): A logical network segment created by grouping devices together based on their function or location, regardless of their physical location. Example: A VLAN used to separate voice and data traffic on a local area network, improving network performance and security.

  82. Virtual Private LAN Service (VPLS): A networking technology that enables multiple geographically dispersed LANs to be connected together over a wide area network (WAN). Example: A company using VPLS to connect its branch offices together into a single virtual LAN, providing seamless connectivity for its employees.

  83. Virtual Private Network (VPN): A secure network connection established over a public network, such as the Internet, to enable remote access to a private network. Example: An employee using a VPN to connect securely to a company's network from a remote location.

  84. Wireless Access Point (WAP): A networking device that allows wireless devices to connect to a wired network. Example: A wireless access point installed in a coffee shop, allowing customers to connect to the shop's Wi-Fi network to access the Internet.

  85. Wireless Networking: A type of network that uses wireless signals to transmit data between devices. Example: A home Wi-Fi network that allows multiple devices, such as computers, smartphones, and tablets, to connect to the Internet wirelessly.

  86. Wired Equivalent Privacy (WEP): A security protocol used to encrypt data transmitted over wireless networks. Example: A wireless network using WEP to encrypt data transmitted between devices, providing a basic level of security.

  87. Wide Area Application Services (WAAS): A technology used to optimize the performance of applications and data transmitted over a wide area network (WAN). Example: A company using WAAS to optimize the performance of its business-critical applications, such as email and database applications, over its WAN.

  88. Wide Area Network (WAN): A type of network that spans a large geographical area, typically connecting multiple local area networks (LANs) together. Example: A telecommunications provider's network connecting multiple cities together, providing high-speed connectivity for businesses and individuals.

  89. WPA/WPA2 (Wi-Fi Protected Access/Wi-Fi Protected Access II): Security protocols used to encrypt data transmitted over wireless networks. Example: A wireless network using WPA2 to encrypt data transmitted between devices, providing a high level of security.

Next article How to Choose the Right Router for Your Home Network

Compare products

{"one"=>"Select 2 or 3 items to compare", "other"=>"{{ count }} of 3 items selected"}

Select first item to compare

Select second item to compare

Select third item to compare

Compare