Management Definitions

  • #

    3GPP (3rd Generation Partnership Project)

    The 3rd Generation Partnership Project (3GPP) is a collaborative project between a group of telecommunications associations with the initial goal of developing globally applicable specifications for third-generation (3G) mobile systems.

  • A

    application delivery controller (ADC)

    An application delivery controller (ADC) is a network component that manages and optimizes how client machines connect to web and enterprise application servers.

  • autonomous system (AS)

    An autonomous system (AS) in networking is a collection of one or more associated Internet Protocol (IP) prefixes with a clearly defined routing policy that governs how the AS exchanges routing information with other autonomous systems.

  • network availability

    Network availability is the amount of uptime in a network system over a specific time interval.

  • B

    bandwidth (network bandwidth)

    Network bandwidth is a measurement indicating the maximum capacity of a wired or wireless communications link to transmit data over a network connection in a given amount of time.

  • baseboard management controller (BMC)

    A baseboard management controller (BMC) is a specialized service processor that remotely monitors the physical state of a host system, such as a computer, network server or other hardware devices.

  • bit stuffing

    Bit stuffing refers to the insertion of one or more bits into a data transmission as a way to provide signaling information to a receiver.

  • bogon

    A bogon is an illegitimate Internet Protocol address that falls into a set of IP addresses that have not been officially assigned to an entity by an internet registration institute, such as the IANA.

  • C

    CBRS (Citizens Broadband Radio Service)

    Citizens Broadband Radio Service, or CBRS, is the set of operational rules given to a slice of the shared wireless spectrum and the technologies used in that spectrum.

  • Cisco Enterprise Agreement (EA)

    Cisco Enterprise Agreement (EA) is a software buying program that digitizes and simplifies license management for Cisco suite customers.

  • collision in networking

    In a half-duplex Ethernet network, a collision is the result of two devices on the same Ethernet network attempting to transmit data at the same time.

  • computer network

    A computer network is a group of interconnected nodes or computing devices that exchange data and resources with each other.

  • D

    data streaming

    Data streaming is the continuous transfer of data from one or more sources at a steady, high speed for processing into specific outputs.

  • deep packet inspection (DPI)

    Deep packet inspection (DPI) is an advanced method of examining and managing network traffic.

  • F

    fault management

    Fault management is the component of network management that detects, isolates and fixes problems.

  • FCAPS (fault, configuration, accounting, performance and security)

    FCAPS (fault, configuration, accounting, performance and security) is a network management framework created by the International Organization for Standardization (ISO).

  • H

    HAProxy

    HAProxy is a high-performance, open source load balancer and reverse proxy for TCP and HTTP applications.

  • L

    load balancing

    Load balancing is a technique used to distribute network traffic across a pool of servers known as a server farm.

  • M

    mean time to innocence

    Mean time to innocence is the average elapsed time between when a system problem is detected and any given team's ability to say the team or part of its system is not the root cause of the problem.

  • N

    network analytics

    Network analytics is the application of big data principles and tools to the data used to manage and secure data networks.

  • network analyzer (protocol analyzer or packet analyzer)

    A network analyzer -- also called a network protocol analyzer or packet analyzer -- is a software application, dedicated appliance or feature set within a network component used in network performance troubleshooting or to enhance protection against malicious activity within a corporate network.

  • Network as a Service (NaaS)

    Network as a service, or NaaS, is a business model for delivering enterprise WAN services virtually on a subscription basis.

  • network assurance

    Network assurance is the method of validating whether services and policies configured on and across network appliances appropriately align with operational goals.

  • network automation

    Network automation is a methodology in which software automatically configures, provisions, manages and tests network devices.

  • network configuration management (NCM)

    Network configuration management is the process of organizing and maintaining information about all of the components in a computer network.

  • network downtime

    Network downtime refers to inaccessibility to part or all of a network due to the failure of hardware, software or some combination of the two.

  • network management

    A cornerstone of all computing is the ability to connect one machine, system or device to another -- enabling what is known as a computer network.

  • network management system

    A network management system, or NMS, is an application or set of applications that lets network engineers manage a network's independent components inside a bigger network management framework and performs several key functions.

  • network monitoring

    Network monitoring, also frequently called network management, is the practice of consistently overseeing a computer network for any failures or deficiencies to ensure continued network performance.

  • network operations center (NOC)

    A network operations center (NOC) is a centralized place from which enterprise information technology (IT) administrators -- either internal or third party -- supervise, monitor and maintain a telecommunications network.

  • network orchestration

    Network orchestration is the use of a software-defined network controller that facilitates the creation of network and network security services to achieve business goals.

  • network performance monitoring (NPM)

    Network performance monitoring (NPM) is the process of measuring and monitoring the quality of service of a network.

  • network scanning

    Network scanning is a procedure for identifying active devices on a network by employing a feature or features in the network protocol to signal devices and await a response.

  • network visibility

    Network visibility is an awareness of the components and data within an enterprise computer network.

  • NFV MANO (network functions virtualization management and orchestration)

    NFV MANO (network functions virtualization management and orchestration), also called MANO, is an architectural framework for managing and orchestrating virtualized network functions (VNFs) and other software components.

  • What is NetOps? Everything you need to know

    NetOps, also referred to as NetOps 2.0 and NetDevOps, is an approach to networking operations that uses DevOps tools and techniques to make network changes more efficiently and effectively than in the past.

  • O

    open networking

    Open networking describes a network that uses open standards and commodity hardware.

  • operational support system (OSS)

    An operational support system (OSS) is a set of programs that helps a communications service provider monitor, control, analyze and manage a telephone or computer network.

  • P

    ping

    A ping (Packet Internet or Inter-Network Groper) is a basic internet program that enables a user to test and verify if a particular destination Internet Protocol (IP) address exists and can accept requests in computer network administration.

  • programmable network (network programmability)

    A programmable network is one in which the behavior of network devices and flow control is handled by software that operates independently of network hardware.

  • R

    remote infrastructure management

    Remote infrastructure management, or RIM, is a comprehensive approach to handling and overseeing an organization's IT infrastructure, systems and services from a remote location.

  • runbook

    Runbooks are a set of standardized written procedures for completing repetitive IT processes within a company.

  • S

    software-defined networking monitoring application (SDN monitoring application)

    An SDN monitoring application is a software program that oversees the traffic in a software-defined network (SDN) as a component of network management.

  • streaming network telemetry

    Streaming network telemetry is a real-time data collection service in which network devices, such as routers, switches and firewalls, continuously push data related to the network's health to a centralized location.

  • T

    time-to-live (TTL)

    Time-to-live (TTL) is a value for the period of time that a packet, or data, should exist on a computer or network before being discarded.

  • traffic shaping

    Traffic shaping, also known as packet shaping, is a congestion management method that regulates network data transfer by delaying the flow of less important or less desired packets.

Unified Communications
Mobile Computing
Data Center
ITChannel
Close