-
virtual private LAN service (VPLS)
Virtual private LAN service (VPLS) is a technology that makes it possible to connect local area networks (LANs) over the Internet, so that they appear to subscribers like a single Ethernet LAN. A V...18 Apr 2007
-
GMPLS (Generalized Multiprotocol Label Switching or Multiprotocol Lambda Switching)
GMPLS (Generalized Multiprotocol Label Switching), also known as Multiprotocol Lambda Switching, is a technology that provides enhancements to Multiprotocol Label Switching (MPLS) to support networ...18 Apr 2007
-
hardware VPN
A hardware VPN is a virtual private network ( VPN) based on a single, stand-alone device.18 Apr 2007
-
routing table
A routing table is a set of rules, often viewed in table format, that is used to determine where data packets traveling over an Internet Protocol (IP) network will be directed.18 Apr 2007
-
hardware load-balancing device (HLD)
A hardware load-balancing device (HLD), also known as a layer 4-7 router, is a physical unit that directs computers to individual servers in a network, based on factors such as server processor uti...18 Apr 2007
-
split horizon
Split horizon is a method of preventing a routing loop in a network.18 Apr 2007
-
route poisoning
Route poisoning is a method of preventing a network from sending packets through a route that has become invalid.18 Apr 2007
-
reverse DNS (rDNS)
Reverse DNS (rDNS) is a method of resolving an IP address into a domain name, just as the domain name system (DNS) resolves domain names into associated IP addresses.18 Apr 2007
-
start of authority record
A start of authority (SOA) record is information stored in a domain name system (DNS) zone about that zone and about other DNS records.18 Apr 2007
-
core router
A core router is a router that forwards packets to computer hosts within a network (but not between networks).18 Apr 2007
-
CRC-4 (Cyclic Redundancy Check 4)
CRC-4 (Cyclic Redundancy Check 4) is a form of cyclic redundancy checking (a method of checking for errors in transmitted data) that is used on E-1 trunk lines.18 Apr 2007
-
segmentation and reassembly (SAR)
In a packet-switched telecommunication network, segmentation and reassembly (SAR, sometimes just referred to as segmentation) is the process of breaking a packet into smaller units before transmiss...18 Apr 2007
-
home agent
In Mobile Internet Protocol (Mobile IP), a home agent is a router on a mobile node's home network that maintains information about the device's current location, as identified in its care-of address.18 Apr 2007
-
red route
A red route is one of three categories of Internet route states defined by the Policy Analysis of Internet Routing (PAIR) project, an initiative dedicated to the development of tools that ISPs (Int...18 Apr 2007
-
PAIR (Policy Analysis of Internet Routing)
The Policy Analysis of Internet Routing (PAIR) project is a Merit Network initiative dedicated to developing tools that Internet service providers (ISPs), network operators, and end users can use t...18 Apr 2007
-
green route
A green route is one of three categories of Internet route states defined by the Policy Analysis of Internet Routing (PAIR) project, an initiative dedicated to the development of tools that ISPs (I...18 Apr 2007
-
Network monitoring gets video game touch
Network monitoring vendor NetQoS has created a tool that monitors the network using video game-like graphics and sounds to highlight problems on the network.18 Apr 2007
-
Should I add a T3 link or a T1 to my LAN?
Learn what the T1 bandwidth restrictions are so that you can decide whether a T3 link or a T1 link should be added to your LAN.18 Apr 2007
-
Can a machine with a single DNS name have multiple addresses?
Can a machine with a single DNS name have multiple addresses? Learn from networking fundamentals expert Chris Partsenidis in this expert response.18 Apr 2007
-
grey route
A grey route is one of three categories of Internet routes defined by the Policy Analysis of Internet Routing (PAIR) project, an initiative dedicated to the development of tools that ISPs (Internet...17 Apr 2007
Network Management Strategies for the CIO