97 relations: Asynchronous transfer mode, Bit rate, Bridging (networking), Broadband, Broadcast domain, Broadcasting (networking), Cable Internet access, Carrier-sense multiple access with collision detection, Cisco Systems, Collision domain, Command-line interface, Computer network, Computer port (hardware), Content delivery network, Data link layer, Digital subscriber line, DIN rail, Duplex (telecommunications), Electrical enclosure, Energy-Efficient Ethernet, Ethernet, Ethernet hub, Fibre Channel, Fibre Channel switch, Fibre to the office, Firewall (computing), Fully switched network, G.hn, Hierarchical internetworking model, IBM, IEEE 802.11, IEEE 802.1aq, IEEE 802.1X, IGMP snooping, Industrial Ethernet, InfiniBand, Intrusion detection system, IP multicast, IP routing, IPsec, ITU-T, Kalpana (company), LAN switching, Link aggregation, Load balancing (computing), Local area network, MAC address, MAC filtering, MAC flooding, Multilayer switch, ..., Network Access Control, Network address, Network address translation, Network layer, Network packet, Network segment, Network tap, Networking hardware, OSI model, Packet analyzer, Packet switching, Plug and play, Port mirroring, Power over Ethernet, RapidIO, Residential gateway, RMON, Router (computing), Routing, Routing protocol, Secure Shell, SFlow, Simple Network Management Protocol, Small office/home office, Spanning Tree Protocol, Stackable switch, System console, Telecommunications link, Telephone exchange, Telnet, Terminal server, Token ring, Transmission Control Protocol, Tree (graph theory), Turing switch, Uninterruptible power supply, URL, Virtual LAN, Virtual private network, Voice over IP, VoIP phone, Web browser, Web cache, Wide area network, Wireless access point, Wiring closet, 19-inch rack. Expand index (47 more) » « Shrink index
Asynchronous transfer mode (ATM) is, according to the ATM Forum, "a telecommunications concept defined by ANSI and ITU (formerly CCITT) standards for carriage of a complete range of user traffic, including voice, data, and video signals".
In telecommunications and computing, bit rate (bitrate or as a variable R) is the number of bits that are conveyed or processed per unit of time.
A network bridge is a computer networking device that creates a single aggregate network from multiple communication networks or network segments.
In telecommunications, broadband is wide bandwidth data transmission which transports multiple signals and traffic types.
A broadcast domain is a logical division of a computer network, in which all nodes can reach each other by broadcast at the data link layer.
In computer networking, telecommunication and information theory, broadcasting is a method of transferring a message to all recipients simultaneously.
In telecommunications, cable Internet access, shortened to cable Internet, is a form of broadband Internet access which uses the same infrastructure as a cable television.
Carrier-sense multiple access with collision detection (CSMA/CD) is a media access control method used most notably in early Ethernet technology for local area networking.
Cisco Systems, Inc. is an American multinational technology conglomerate headquartered in San Jose, California, in the center of Silicon Valley, that develops, manufactures and sells networking hardware, telecommunications equipment and other high-technology services and products.
A collision domain is a network segment connected by a shared medium or through repeaters where data packets may collide with one another while being sent.
A command-line interface or command language interpreter (CLI), also known as command-line user interface, console user interface and character user interface (CUI), is a means of interacting with a computer program where the user (or client) issues commands to the program in the form of successive lines of text (command lines).
A computer network, or data network, is a digital telecommunications network which allows nodes to share resources.
In computer hardware, a port serves as an interface between the computer and other computers or peripheral devices.
A content delivery network or content distribution network (CDN) is a geographically distributed network of proxy servers and their data centers.
The data link layer, or layer 2, is the second layer of the seven-layer OSI model of computer networking.
Digital subscriber line (DSL; originally digital subscriber loop) is a family of technologies that are used to transmit digital data over telephone lines.
A DIN rail is a metal rail of a standard type widely used for mounting circuit breakers and industrial control equipment inside equipment racks.
A duplex communication system is a point-to-point system composed of two or more connected parties or devices that can communicate with one another in both directions.
An electrical enclosure is a cabinet for electrical or electronic equipment to mount switches, knobs and displays and to prevent electrical shock to equipment users and protect the contents from the environment.
Energy-Efficient Ethernet (EEE) is a set of enhancements to the twisted-pair and backplane Ethernet family of computer networking standards that reduce power consumption during periods of low data activity.
Ethernet is a family of computer networking technologies commonly used in local area networks (LAN), metropolitan area networks (MAN) and wide area networks (WAN).
An Ethernet hub, active hub, network hub, repeater hub, multiport repeater, or simply hub is a network hardware device for connecting multiple Ethernet devices together and making them act as a single network segment.
Fibre Channel, or FC, is a high-speed network technology (commonly running at 1, 2, 4, 8, 16, 32, and 128 gigabit per second rates) providing in-order, lossless delivery of raw block data, primarily used to connect computer data storage to servers.
In the computer storage field, a Fibre Channel switch is a network switch compatible with the Fibre Channel (FC) protocol.
Fiber to the office (FTTO) is an alternative cabling concept for local area network (LAN) network office environments.
In computing, a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
A fully switched network is a computer network which uses only network switches rather than Ethernet hubs on Ethernet networks.
G.hn is a specification for home networking with data rates up to 2 Gbit/s and operation over four types of legacy wires: telephone wiring, coaxial cables, power lines and plastic optical fiber.
The Hierarchical internetworking model is a three-layer model for network design first proposed by Cisco.
The International Business Machines Corporation (IBM) is an American multinational technology company headquartered in Armonk, New York, United States, with operations in over 170 countries.
IEEE 802.11 is a set of media access control (MAC) and physical layer (PHY) specifications for implementing wireless local area network (WLAN) computer communication in the 900 MHz and 2.4, 3.6, 5, and 60 GHz frequency bands.
Shortest Path Bridging (SPB), specified in the IEEE 802.1aq standard, is a computer networking technology intended to simplify the creation and configuration of networks, while enabling multipath routing.
IEEE 802.1X is an IEEE Standard for port-based Network Access Control (PNAC).
IGMP snooping is the process of listening to Internet Group Management Protocol (IGMP) network traffic.
Industrial Ethernet (IE) is the use of Ethernet in an industrial environment with protocols that provide determinism and real-time control.
InfiniBand (abbreviated IB) is a computer-networking communications standard used in high-performance computing that features very high throughput and very low latency.
An intrusion detection system (IDS) is a device or software application that monitors a network or systems for malicious activity or policy violations.
IP multicast is a method of sending Internet Protocol (IP) datagrams to a group of interested receivers in a single transmission.
IP routing is the field of routing methodologies of Internet Protocol (IP) packets within and across IP networks.
In computing, Internet Protocol Security (IPsec) is a secure network protocol suite of IPv4 that authenticates and encrypts the packets of data sent over an IPv4 network.
The ITU Telecommunication Standardization Sector (ITU-T) is one of the three sectors (divisions or units) of the International Telecommunication Union (ITU); it coordinates standards for telecommunications.
Kalpana, a computer-networking equipment manufacturer located in Silicon Valley, operated during the 1980s and 1990s.
LAN switching is a form of packet switching used in local area networks (LAN).
In computer networking, the term link aggregation applies to various methods of combining (aggregating) multiple network connections in parallel in order to increase throughput beyond what a single connection could sustain, and to provide redundancy in case one of the links should fail.
In computing, load balancing improves the distribution of workloads across multiple computing resources, such as computers, a computer cluster, network links, central processing units, or disk drives.
A local area network (LAN) is a computer network that interconnects computers within a limited area such as a residence, school, laboratory, university campus or office building.
A media access control address (MAC address) of a device is a unique identifier assigned to a network interface controller (NIC) for communications at the data link layer of a network segment.
In computer networking, Media Access Control MAC Filtering (or EUI filtering, or layer 2 address filtering) refers to a security access control method whereby the 48-bit address assigned to each network card is used to determine access to the network.
In computer networking, a media access control attack or MAC flooding is a technique employed to compromise the security of network switches.
A multilayer switch (MLS) is a computer networking device that switches on OSI layer 2 like an ordinary network switch and provides extra functions on higher OSI layers.
Network Access Control (NAC) is an approach to computer security that attempts to unify endpoint security technology (such as antivirus, host intrusion prevention, and vulnerability assessment), user or system authentication and network security enforcement.
A network address is an identifier for a node or host on a telecommunications network.
Network address translation (NAT) is a method of remapping one IP address space into another by modifying network address information in the IP header of packets while they are in transit across a traffic routing device.
In the seven-layer OSI model of computer networking, the network layer is layer 3.
A network packet is a formatted unit of data carried by a packet-switched network.
A network segment is a portion of a computer network.
A Network TAP (Terminal Access Point) denotes a system which monitors events on a local network and in order to aid administrators (or attackers) in analyzing the network.
Networking hardware, also known as network equipment or computer networking devices, are physical devices which are required for communication and interaction between devices on a computer network.
The Open Systems Interconnection model (OSI model) is a conceptual model that characterizes and standardizes the communication functions of a telecommunication or computing system without regard to its underlying internal structure and technology.
A packet analyzer (also known as a packet sniffer) is a computer program or piece of computer hardware that can intercept and log traffic that passes over a digital network or part of a network.
Packet switching is a method of grouping data which is transmitted over a digital network into packets which are made of a header and a payload.
In computing, a plug and play (PnP) device or computer bus, is one with a specification that facilitates the discovery of a hardware component in a system without the need for physical device configuration or user intervention in resolving resource conflicts.
Port mirroring is used on a network switch to send a copy of network packets seen on one switch port (or an entire VLAN) to a network monitoring connection on another switch port.
Power over Ethernet or PoE describes any of several standard or ad-hoc systems which pass electric power along with data on twisted pair Ethernet cabling.
The RapidIO architecture is a high-performance packet-switched, interconnect technology.
In telecommunications networking, a residential gateway (more commonly known as a home router or home gateway) is a device that allows a local area network (LAN) to connect to a wide area network (WAN) via a modem.
The Remote Network MONitoring (RMON) MIB was developed by the IETF to support monitoring and protocol analysis of LANs.
A router is a networking device that forwards data packets between computer networks.
Routing is the process of selecting a path for traffic in a network, or between or across multiple networks.
A routing protocol specifies how routers communicate with each other, distributing information that enables them to select routes between any two nodes on a computer network.
Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network.
sFlow, short for "sampled flow", is an industry standard for packet export at Layer 2 of the OSI model.
Simple Network Management Protocol (SNMP) is an Internet Standard protocol for collecting and organizing information about managed devices on IP networks and for modifying that information to change device behavior.
Small office/home office (or single office/home office; SOHO) refers to the category of business or cottage industry that involves from 1 to 10 workers.
The Spanning Tree Protocol (STP) is a network protocol that builds a loop-free logical topology for Ethernet networks.
A stackable switch is a network switch that is fully functional operating standalone but which can also be set up to operate together with one or more other network switches, with this group of switches showing the characteristics of a single switch but having the port capacity of the sum of the combined switches.
The system console, computer console, root console, operator's console, or simply console is the text entry and display device for system administration messages, particularly those from the BIOS or boot loader, the kernel, from the init system and from the system logger.
In telecommunications a link is a communication channel that connects two or more devices.
A telephone exchange is a telecommunications system used in the public switched telephone network or in large enterprises.
Telnet is a protocol used on the Internet or local area network to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection.
A terminal server enables organizations to connect devices with an RS-232, RS-422 or RS-485 serial interface to a local area network (LAN).
MAU b) Using several MAUs connected to each other Token ring network IBM hermaphroditic connector with locking clip Token Ring local area network (LAN) technology is a communications protocol for local area networks.
The Transmission Control Protocol (TCP) is one of the main protocols of the Internet protocol suite.
In mathematics, and more specifically in graph theory, a tree is an undirected graph in which any two vertices are connected by exactly one path.
In theoretical network science, the Turing switch is a logical construction modeling the operation of the network switch, just as in theoretical computer science a Turing machine models the operation of a computer.
An uninterruptible power supply or uninterruptible power source (UPS) is an electrical apparatus that provides emergency power to a load when the input power source or mains power fails.
A Uniform Resource Locator (URL), colloquially termed a web address, is a reference to a web resource that specifies its location on a computer network and a mechanism for retrieving it.
A virtual LAN (VLAN) is any broadcast domain that is partitioned and isolated in a computer network at the data link layer (OSI layer 2).
A virtual private network (VPN) extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.
Voice over Internet Protocol (also voice over IP, VoIP or IP telephony) is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet.
A VoIP phone or IP phone uses voice over IP technologies for placing and transmitting telephone calls over an IP network, such as the Internet, instead of the traditional public switched telephone network (PSTN).
A web browser (commonly referred to as a browser) is a software application for accessing information on the World Wide Web.
A web cache (or HTTP cache) is an information technology for the temporary storage (caching) of web documents, such as HTML pages and images, to reduce server lag.
A wide area network (WAN) is a telecommunications network or computer network that extends over a large geographical distance/place.
20018 In computer networking, a wireless access point (WAP), or more generally just access point (AP), is a networking hardware device that allows a Wi-Fi device to connect to a wired network.
A wiring closet is a small room commonly found in institutional buildings, such as schools and offices, where electrical connections are made.
A 19-inch rack is a standardized frame or enclosure for mounting multiple electronic equipment modules.
10/100 switch, Bridging hub, Ethernet Switch, Ethernet switch, LAN Switches, LAN switch, Lan switch, MAC bridge, MAC switch, Manageable and Unmanageable switches, Managed switch, Network Switch, Network switch port, Network switcher, Network switches, Networking switch, Switch (Network), Switch (computer), Switch (computing), Switch (network), Switch (networking), Switch mac address, Switch port, Switched Ethernet, Switched ethernet, Switching hub.