IT Glossary - N - ITU Online

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Network Congestion

A situation where a network node or link is carrying more data than it can handle, causing packet loss and delay.

You will find this term commonly used in Networking, IT Management

Network Controller

A specialized hardware or software used to manage network resources efficiently.

You will find this term commonly used in Networking, IT Management

Network Decomposition

The process of breaking down a complex network into simpler, more manageable parts for analysis or management.

You will find this term commonly used in Networking, IT Management

Network Deployment

The process of rolling out new network infrastructure, services, or applications to a production environment.

You will find this term commonly used in Networking, IT Management

Network Diagram

A network diagram is a visual representation of the components, connections, and interactions within a computer network. It helps network administrators and engineers visualize and understand the network topology, configuration, and dependencies.

You will find this term commonly used in Networking

Network Diameter

A measure of the longest distance between two nodes in a network, which can indicate the network's size and complexity.

You will find this term commonly used in Networking, Network Design

Network Diction

The set of protocols and standards used for communication within a network.

You will find this term commonly used in Networking, Standards

Network Discovery

The process of identifying and mapping devices, resources, and services on a computer network.

You will find this term commonly used in Networking, Security

Network Diversification

The strategy of using multiple network paths and technologies to increase resilience and reduce the risk of network failure.

You will find this term commonly used in Networking, Security

Network Edge

The outermost layer of the network, closest to the end-users, where edge computing devices are located.

You will find this term commonly used in Networking, Edge Computing

Network Emulation

The technique of imitating the behavior of a network under various conditions, used for testing and analysis.

You will find this term commonly used in Networking, Testing

Network Encryption

The process of encoding data transmitted over a computer network to ensure its confidentiality and integrity.

You will find this term commonly used in Security, Cybersecurity

Network Endpoint

Any device or terminal that communicates over a network, such as computers, mobile devices, or IoT devices.

You will find this term commonly used in Networking, Security

Network Enforcer

A security appliance or software that ensures compliance with network policies and regulations by controlling access to the network.

You will find this term commonly used in Networking, Security

Network Engineering

The discipline concerned with designing, implementing, and managing computer networks.

You will find this term commonly used in Networking, IT Management

Network Enumeration

The process of retrieving user names, machine names, network resources, and other services from a network.

You will find this term commonly used in Networking, Security

Network Fabric

The interconnection of network elements and switches that are fully connected to each other.

You will find this term commonly used in Networking, Data Center

Network Fabrication

The process of creating a network topology, often in the context of virtualized or software-defined networking.

You will find this term commonly used in Networking, Network Design

Network Fading

A phenomenon in wireless communications where signal strength decreases due to environmental factors.

You will find this term commonly used in Networking, Wireless Communications

Network Federation

The process of linking together multiple networks or services to function as a single, unified system.

You will find this term commonly used in Networking, Cloud Computing

Network Firewall

A security device or software that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

You will find this term commonly used in Security, Cybersecurity

Network Flow

The sequence of packets from a source to a destination that is identified by a specific path or route.

You will find this term commonly used in Networking, Data Analysis

Network Forensics

Network forensics is the process of investigating and analyzing network traffic, logs, and activities to uncover evidence of security breaches, cyber attacks, or unauthorized activities within a computer network. It helps identify the source and impact of security incidents and support legal proceedings or incident response efforts.

You will find this term commonly used in Cybersecurity

Network Forensics Analysis Tool (NFAT)

Software tools used for capturing, recording, and analyzing network traffic to detect unauthorized access or malicious activity.

You will find this term commonly used in Networking, Security

Network Functions Virtualization

Network functions virtualization (NFV) is a network architecture approach that involves virtualizing networking services traditionally implemented in hardware, such as routers, firewalls, and load balancers, to improve scalability and flexibility.

You will find this term commonly used in Networking, Virtualization

Network Gateway

A network node equipped for interfacing with another network that uses different protocols.

You will find this term commonly used in Networking, Interoperability

Network Health Monitoring

The process of continuously monitoring a network for issues that could affect the performance and availability of network services.

You will find this term commonly used in Networking, IT Management

Network Hierarchy

The layered structure of a network, defining various levels of control, distribution, and access layers.

You will find this term commonly used in Networking, Network Design

Network Hub

A common connection point for devices in a network that uses broadcast to send data to all connected devices.

You will find this term commonly used in Networking, Hardware

Network Identification

The process or the means by which a network device or service is recognized and differentiated from others on a network.

You will find this term commonly used in Networking, Security

Network Infrastructure

The hardware and software components that enable communication, management, and connectivity in a computer network.

You will find this term commonly used in Networking

Network Interface

A network interface is a hardware or software component that enables a device to connect to a network. It provides the necessary physical or logical interface between the device and the network medium, allowing data transmission and reception.

You will find this term commonly used in Networking

Network Interface Card

A network interface card (NIC) is a hardware component that enables a computer to connect to a network, providing the necessary physical and data link layer interfaces for communication.

You will find this term commonly used in Networking, Hardware

Network Interface Card (NIC)

A hardware component that connects a computer or other device to a network, allowing it to send and receive data.

You will find this term commonly used in Networking

Network Jitter

The variation in the time of arrival of packets over a network, which can affect the quality of streaming media and real-time communications.

You will find this term commonly used in Networking, Performance Management

Network Kernel Extension (NKE)

A module that can be loaded into the kernel of an operating system to extend its networking capabilities.

You will find this term commonly used in Networking, Operating Systems

Network Layer

The network layer is the third layer of the OSI model and is responsible for routing packets across different networks to their destination. It determines the best path for data transmission and handles logical addressing and packet forwarding.

You will find this term commonly used in Networking

Network Licensing

A software licensing model that allows users to access software over a network, often based on the number of concurrent users.

You will find this term commonly used in Software Development, Licensing

Network Load Balancing

The process of distributing network traffic across multiple servers or network links to optimize resource utilization, reliability, and responsiveness.

You will find this term commonly used in Networking

Network Management

The administration and maintenance of computer networks to ensure their efficient operation, security, and reliability.

You will find this term commonly used in Networking

Network Management System (NMS)

A set of tools and applications designed for managing, monitoring, and maintaining computer networks.

You will find this term commonly used in Networking, IT Management

Network Mapping

The study of the physical connectivity of networks e.g., internet.

You will find this term commonly used in Networking, Security

Network Mapping Tool

Software used to visualize the layout and connections of a network, aiding in analysis and troubleshooting.

You will find this term commonly used in Networking, IT Management

Network Mashup

The combination of data or functionality from multiple sources over the network to create a new service or application.

You will find this term commonly used in Web Development, APIs

Network Modeling

The process of creating a mathematical model of a network to study its behavior under different scenarios.

You will find this term commonly used in Networking, Analysis

Network Modularization

The design principle of structuring a network into discrete modules to simplify management, enhance scalability, and improve resilience.

You will find this term commonly used in Networking, Design

Network Monitor

Software or hardware that observes and analyzes network traffic for performance evaluation, security monitoring, or troubleshooting.

You will find this term commonly used in Networking, Security

Network Monitoring

The process of observing and analyzing network traffic to ensure optimal performance, security, and availability.

You will find this term commonly used in Networking, Security

Network Operating System (NOS)

A network operating system (NOS) is software that provides the infrastructure and services necessary for computers to communicate and share resources in a network. Examples include Windows Server, Linux, and Novell NetWare.

You will find this term commonly used in Networking

Network Operations Center (NOC)

A centralized location where IT professionals directly support the efforts of remote monitoring and management software.

You will find this term commonly used in Networking, IT Management

What's Your
Career Path?
ON SALE 60% OFF
Cisco Network Career Path

Cisco Network Engineer Career Path

Master Cisco Networks in this comprehensive training series. Elevate your career today.
Total Hours
126 Hrs 29 Min
icons8-video-camera-58
459 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
IT User Support Specialist Career Path

Comprehensive IT User Support Specialist Training: Accelerate Your Career

Advance your tech support skills and be a viable member of dynamic IT support teams.
Total Hours
121 Hrs 41 Min
icons8-video-camera-58
610 On-demand Videos

$51.60$169.00

ON SALE 60% OFF
AWS Cloud Practitioner

AWS Cloud Practitioner Career Path

Learn and get certified as an Amazon Web Services Cloud guru. From beginning ot avanced, this series is for you.
Total Hours
62 Hrs 59 Min
icons8-video-camera-58
473 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
azure-administrator-career-path

AZ-104 Learning Path : Become an Azure Administrator

Master the skills needs to become an Azure Administrator and excel in this career path.
Total Hours
105 Hrs 42 Min
icons8-video-camera-58
421 On-demand Videos

$51.60$169.00

ON SALE 60% OFF
CEH Career Path

Certified Ethical Hacker Career Path

This advanced training series teaches you the skills needed to detect vulnerabilities and weaknesses in computer systems and networks. 
Total Hours
126 Hrs 41 Min
icons8-video-camera-58
804 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Pentester Career Path

Pentester Career Path

Designed to equip aspiring professionals with the skills and knowledge essential for excelling in the field of penetration testing.
Total Hours
96 Hrs 49 Min
icons8-video-camera-58
419 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Analyst Career Path

Information Security Analyst Career Path

Dive into Cybersecurity with our Comprehensive Information Security Analyst training series.
Total Hours
54 Hrs 29 Min
icons8-video-camera-58
215 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Network Security Analyst

Network Security Analyst Career Path

Become a proficient Network Security Analyst with our comprehensive training series, designed to equip you with the skills needed to protect networks and systems against cyber threats. Advance your career with key certifications and expert-led courses.
Total Hours
96 Hrs 49 Min
icons8-video-camera-58
419 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Career Path

Leadership Mastery: The Executive Information Security Manager

An advanced training series designed for those with prior experience in IT security disicplines wanting to advance into a management role.
Total Hours
95 Hrs 38 Min
icons8-video-camera-58
346 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Network Administrator Career Path

Network Administrator Career Path

Wanting to become a Network Administrator? This training series offers the core training you need.
Total Hours
158 Hrs 43 Min
icons8-video-camera-58
511 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Google DevOps Engineer Career Path

Google DevOps Engineer Career Path

Expand your cloud knowledge or explore this career option as a Google DevOps Engineer.
Total Hours
41 Hrs 50 Min
icons8-video-camera-58
475 On-demand Videos

$51.60

Add To Cart
ON SALE 61% OFF
ICD 9

ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

The Medical Billing Specialist training series is a comprehensive educational program designed to equip learners with the essential skills and knowledge required in the field of medical billing and coding.
Total Hours
37 Hrs 56 Min
icons8-video-camera-58
192 On-demand Videos

$39.00

Add To Cart