IT Glossary - N - ITU Online

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Network Optimization

The process of adjusting the configuration and operation of a network to improve its efficiency, performance, and cost-effectiveness.

You will find this term commonly used in Networking, IT Management

Network Orchestration

The automated arrangement, coordination, and management of computer systems, applications, and services within a network.

You will find this term commonly used in Networking, Automation

Network Overlay

A virtual network that is built on top of existing network layers to support virtualized network functions or services.

You will find this term commonly used in Networking, Virtualization

Network Packet

A formatted unit of data carried by a packet-switched network.

You will find this term commonly used in Networking, Data Communication

Network Partitioning

Dividing a network into segments or subnets for improved performance, security, or management.

You will find this term commonly used in Networking, Design

Network Path

The series of connections through which data travels from source to destination across a network.

You will find this term commonly used in Networking, Data Communication

Network Penetration Testing

The process of evaluating the security of a computer network by simulating cyber attacks to identify vulnerabilities and weaknesses.

You will find this term commonly used in Security, Cybersecurity

Network Performance

Network performance refers to the speed, reliability, and efficiency of data transmission and communication within a computer network. It is influenced by factors such as bandwidth, latency, packet loss, and network congestion.

You will find this term commonly used in Networking

Network Performance Management

The practice of monitoring and managing network speed, availability, and reliability to ensure optimal performance.

You will find this term commonly used in Networking, IT Management

Network Performance Monitoring

Network performance monitoring is the continuous process of observing and analyzing network behavior and metrics to ensure optimal performance, identify bottlenecks, and troubleshoot issues.

You will find this term commonly used in Networking

Network Performance Optimization

Network performance optimization is the process of improving the speed, reliability, and efficiency of data transmission and communication within a computer network. It involves identifying and addressing bottlenecks, optimizing network configurations, and implementing technologies to enhance performance.

You will find this term commonly used in Networking

Network Perimeter

The boundary between an organization's secure internal network and the unsecured outside world.

You will find this term commonly used in Networking, Security

Network Planning

Network planning involves the design, configuration, and optimization of computer networks to meet the current and future requirements of an organization. It includes tasks such as capacity planning, topology design, and technology selection to ensure efficient and reliable network operation.

You will find this term commonly used in Networking

Network Policy

A set of rules and configurations designed to govern the behavior and security of a network and its resources.

You will find this term commonly used in Networking, Security

Network Policy Server (NPS)

A Microsoft server role that allows the creation and enforcement of network access policies for client health, connection request authentication, and connection request authorization.

You will find this term commonly used in Networking, Security

Network Port

A communication endpoint or interface where data is transferred in or out of a system or between systems.

You will find this term commonly used in Networking, Data Communication

Network Presence

The state or fact of existing, being present, or being available over a network, especially on the internet.

You will find this term commonly used in Networking, Web Presence

Network Processor

A high-performance microprocessor specifically designed for the processing needs of network data (packets).

You will find this term commonly used in Networking, Hardware

Network Programming

The development of software applications that function over a network to communicate with other applications or devices.

You will find this term commonly used in Software Development, Networking

Network Protocol

A set of rules and conventions governing how data is transmitted and received over a computer network.

You will find this term commonly used in Networking

Network Protocol Analyzer

A network protocol analyzer, also known as a packet sniffer or network analyzer, is a software tool used to capture, decode, and analyze network traffic in real-time. It helps troubleshoot network issues, identify security threats, and optimize network performance.

You will find this term commonly used in Networking, Security

Network Protocol Stack

The collection of network protocols used together to handle communication over a network, organized in layers as per the OSI or TCP/IP model.

You will find this term commonly used in Networking, Protocols

Network Provisioning

The process of setting up the network infrastructure and services.

You will find this term commonly used in Networking, IT Management

Network QoS (Quality of Service)

The use of various technologies to manage network traffic, reduce latency, and enhance user experience.

You will find this term commonly used in Networking, IT Management

Network Quality of Service (QoS)

Policies and technologies to control traffic and ensure the performance of critical applications by managing bandwidth, delay, jitter, and packet loss.

You will find this term commonly used in Networking, Performance Management

Network Query

A request for information from the network, typically involving retrieval of data or status information about network resources or services.

You will find this term commonly used in Networking, Data Communication

Network Query Language (NQL)

A specialized query language for managing, updating, and retrieving data from a network-oriented database.

You will find this term commonly used in Networking, Data Management

Network Reconstruction

The process of rebuilding network infrastructure and services after a failure or disaster to restore normal operations.

You will find this term commonly used in Networking, Disaster Recovery

Network Redundancy

Network redundancy is the duplication of critical network components, connections, or pathways to ensure continuous operation and fault tolerance in case of component failures or network disruptions. It helps improve reliability and availability of network services.

You will find this term commonly used in Networking

Network Refactoring

The process of restructuring existing network architecture without changing its external behavior, to improve internal structure, efficiency, or manageability.

You will find this term commonly used in Networking, Design

Network Registration

The process by which devices or users are recognized and authorized to access network resources, often involving authentication and allocation of network addresses or resources.

You will find this term commonly used in Networking, Security

Network Reliability

The ability of a network to perform its required functions under stated conditions for a specified period of time without failure.

You will find this term commonly used in Networking, Reliability

Network Replication

The process of copying data or services from one network location to another to ensure data consistency and availability across multiple sites.

You will find this term commonly used in Networking, Data Management

Network Resilience

The ability of a network to maintain acceptable levels of service in the face of faults and challenges to normal operation.

You will find this term commonly used in Networking, Reliability

Network Resource Allocation

The process of distributing network resources (such as bandwidth, IP addresses) among users or applications according to a certain policy or requirement.

You will find this term commonly used in Networking, Performance Management

Network Response Time

The amount of time it takes for a network to respond to a request, including the time it takes for data to travel from the source to the destination and back.

You will find this term commonly used in Networking, Performance Management

Network Restoration

The process of returning a network or service to its original or operational state after a disruption or failure.

You will find this term commonly used in Networking, Disaster Recovery

Network Retransmission

The process of sending data again across a network, typically because the original transmission was lost, corrupted, or acknowledged as received incorrectly.

You will find this term commonly used in Networking, Data Communication

Network Routing

The process of selecting paths in a network along which to send network traffic, based on routing protocols and algorithms.

You will find this term commonly used in Networking, Data Communication

Network Routing Protocol

A protocol that specifies how routers communicate with each other, disseminating information that enables them to select routes between any two nodes on a computer network.

You will find this term commonly used in Networking, Protocols

Network Scalability

The ability of a network to handle a growing amount of work, or its potential to accommodate growth in demand for network resources.

You will find this term commonly used in Networking, Design

Network Scan

The process of identifying active devices on a network and their characteristics, such as open ports and running services, often used for security assessment or network management.

You will find this term commonly used in Networking, Security

Network Scheduler

A component that manages the distribution of network traffic across various resources according to a specific scheduling algorithm.

You will find this term commonly used in Networking, Performance Management

Network Schema

A logical blueprint or model that represents the organization, configuration, and relationships of network resources and services.

You will find this term commonly used in Networking, Design

Network Security

Measures taken to protect a computer network from unauthorized access, misuse, or modification.

You will find this term commonly used in Security, Cybersecurity

Network Security Architecture

Network security architecture refers to the design and implementation of security controls, mechanisms, and policies to protect computer networks from unauthorized access, data breaches, and cyber threats. It encompasses technologies such as firewalls, intrusion detection systems, and encryption protocols.

You will find this term commonly used in Networking, Security, Cybersecurity

Network Security Assessment

Network security assessment is the evaluation of an organization's network infrastructure, policies, and procedures to identify vulnerabilities, assess risks, and recommend security controls. It helps improve the overall security posture and compliance with regulations.

You will find this term commonly used in Security, Cybersecurity

Network Security Audit

A network security audit is a systematic evaluation of an organization's computer network infrastructure, policies, and practices to assess security vulnerabilities, compliance with regulatory standards, and adherence to best practices. It helps identify weaknesses and improve overall security posture.

You will find this term commonly used in Security, Cybersecurity

Network Security Controls

Network security controls are measures and mechanisms implemented within a computer network to protect against security threats, vulnerabilities, and attacks. They include technologies such as firewalls, intrusion detection systems, access control lists, and encryption protocols.

You will find this term commonly used in Security, Cybersecurity

Network Security Incident

A network security incident is any adverse event or occurrence within a computer network that poses a threat to the confidentiality, integrity, or availability of data or resources. Examples include unauthorized access, malware infections, and denial-of-service attacks.

You will find this term commonly used in Security, Cybersecurity

What's Your
Career Path?
ON SALE 60% OFF
Information Security Specialist

Entry Level Information Security Specialist Career Path

Jumpstart your cybersecurity career with our training series, designed for aspiring entry-level Information Security Specialists.
Total Hours
109 Hrs 39 Min
icons8-video-camera-58
502 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Analyst Career Path

Information Security Analyst Career Path

Dive into Cybersecurity with our Comprehensive Information Security Analyst training series.
Total Hours
54 Hrs 29 Min
icons8-video-camera-58
215 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Career Path

Leadership Mastery: The Executive Information Security Manager

An advanced training series designed for those with prior experience in IT security disicplines wanting to advance into a management role.
Total Hours
95 Hrs 38 Min
icons8-video-camera-58
346 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Google DevOps Engineer Career Path

Google DevOps Engineer Career Path

Expand your cloud knowledge or explore this career option as a Google DevOps Engineer.
Total Hours
41 Hrs 50 Min
icons8-video-camera-58
475 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
IT User Support Specialist Career Path

Comprehensive IT User Support Specialist Training: Accelerate Your Career

Advance your tech support skills and be a viable member of dynamic IT support teams.
Total Hours
121 Hrs 41 Min
icons8-video-camera-58
610 On-demand Videos

$51.60$169.00

ON SALE 60% OFF
Cisco Network Career Path

Cisco Network Engineer Career Path

Master Cisco Networks in this comprehensive training series. Elevate your career today.
Total Hours
126 Hrs 29 Min
icons8-video-camera-58
459 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Video Editor Career Path

Video Editor Career Path

From mastering editing software to understanding the nuances of visual storytelling, this series is designed for aspiring video editors.
Total Hours
24 Hrs 3 Min
icons8-video-camera-58
154 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
IT Project Manager

IT Project Manager Career Path

Explore the role of an IT Project Manager with our comprehensive IT Manager Career Path Series.
Total Hours
36 Hrs 58 Min
icons8-video-camera-58
151 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
azure-administrator-career-path

AZ-104 Learning Path : Become an Azure Administrator

Master the skills needs to become an Azure Administrator and excel in this career path.
Total Hours
105 Hrs 42 Min
icons8-video-camera-58
421 On-demand Videos

$51.60$169.00

ON SALE 60% OFF
Data Analyst Career Path

Data Analyst Career Path

Become a crucial member of your team as a Data Analyst
Total Hours
56 Hrs 36 Min
icons8-video-camera-58
358 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Network Security Analyst

Network Security Analyst Career Path

Become a proficient Network Security Analyst with our comprehensive training series, designed to equip you with the skills needed to protect networks and systems against cyber threats. Advance your career with key certifications and expert-led courses.
Total Hours
96 Hrs 49 Min
icons8-video-camera-58
419 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Network Administrator Career Path

Network Administrator Career Path

Wanting to become a Network Administrator? This training series offers the core training you need.
Total Hours
158 Hrs 43 Min
icons8-video-camera-58
511 On-demand Videos

$51.60

Add To Cart