-
MDI/MDIX (medium dependent interface/MDI crossover)
MDI/MDIX is a type of Ethernet port connection using twisted pair cabling.30 Oct 2008
-
master/slave
In computer networking, master/slave is a model for a communication protocol in which one device or process (known as the master) controls one or more other devices or processes (known as slaves).30 Oct 2008
-
FECN/BECN (forward explicit congestion notification/backward explicit congestion notification)
In a frame relay network, FECN (forward explicit congestion notification) is a header bit transmitted by the source (sending) terminal requesting that the destination (receiving) terminal slow down...30 Oct 2008
-
client/server
Client/server describes the relationship between two computer programs in which one program, the client, makes a service request from another program, the server, which fulfills the request.30 Oct 2008
-
Carrier Sense Multiple Access/Collision Detect (CSMA/CD)
Carrier Sense Multiple Access/Collision Detect (CSMA/CD) is the protocol for carrier transmission access in Ethernet networks.30 Oct 2008
-
CSU/DSU (Channel Service Unit/Data Service Unit)
A CSU/DSU (Channel Service Unit/Data Service Unit) is a hardware device about the size of an external modem that converts a digital data frame from the communications technology used on a local are...30 Oct 2008
-
CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance)
CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) is a protocol for carrier transmission in 802.11 networks.30 Oct 2008
-
TCP/IP offload engine (TOE)
The TCP/IP offload engine (TOE for short) is a technology that is gaining popularity in high-speed Ethernet systems for the purpose of optimizing throughput.30 Oct 2008
-
TCP/IP (Transmission Control Protocol/Internet Protocol)
TCP/IP (Transmission Control Protocol/Internet Protocol) is the basic communication language or protocol of the Internet30 Oct 2008
-
Hospital gains network visibility by convincing vendors to collaborate
When Concord Hospital needed to install a network behavioral analysis (NBA) tool into a Nortel network built on multi-link trunking, the hospital's network chief had to convince Nortel to collabora...30 Oct 2008
-
Network access control poised for a comeback by aiming small
Network access control (NAC) vendors could make good on their faded hype by offering customers specific solutions to major pain points, such as guest network access control and identity-based access.29 Oct 2008
-
What software monitors and locks users from accessing my router?
Learn which software programs monitors and locks unauthorized users from accessing your router for Internet use in this expert response with our network security expert, Michael Gregg.29 Oct 2008
-
Can IP addresses of LANs that make up a WAN be the same?
Our networking fundamentals expert answers whether the IP addresses of different physical locations (LANs) making up a WAN can be the same address. Find out if networks with the same IP address wil...28 Oct 2008
-
Mastering 802.11n: Implementation tips and answers to frequently-asked WLAN questions
802.11n promises to let us build bigger, faster wireless networks that deliver better reliability and capacity. But tapping this technology's enormous potential will require new products, careful p...28 Oct 2008
-
Tips to secure your network against data theft
If you're looking for a new take on network security, listen to our three-part podcast series on preventing data theft and leakage with Christopher Burgess, author of the recent book, "Secrets Stol...28 Oct 2008
-
On a full-duplex T1 circuit, what's the bandwidth speed in both directions?
Find out if a full-duplex T1 circuit splits its bandwidth between the TX and RX directions.28 Oct 2008
-
Which wireless client vendor will keep my network from disconnecting?
Learn which vendors provide universal wireless clients for Windows laptops that may address network and Internet disconnects as well as missing profile problems, in Ask the Expert response from Lis...27 Oct 2008
-
Which wireless network transmits business-sensitive data reliably?
Our wireless networking expert explains whether WLANs, WWANs or WiMax setups are more reliable and secure for transmitting business critical data to keep enterprise information from being lost.24 Oct 2008
-
Why do we need IP security at the network layer?
Learn why IP security (IPsec) is needed at the network layer -- otherwise known as Layer 3, or L3, of the OSI model. Our enterprise networking security guru explains.23 Oct 2008
-
IEEE 802.11w protects wireless LAN management frames
The IEEE 802.11w wireless encryption standard builds on the 802.11i framework to protect against subtle attacks on wireless LAN (WLAN) management frames. It will increase the confidence of network ...23 Oct 2008
Network Management Strategies for the CIO