IT Glossary - ITU Online IT Training
Ready to start learning?Individual Plans →Team Plans →

IT Glossary

Showing terms starting with N (247 terms)

Network Congestion

A situation where a network node or link is carrying more data than it can handle, causing packet loss and delay.

Commonly used in Networking, IT Management

Network Controller

A specialized hardware or software used to manage network resources efficiently.

Commonly used in Networking, IT Management

Network Decomposition

The process of breaking down a complex network into simpler, more manageable parts for analysis or management.

Commonly used in Networking, IT Management

Network Deployment

The process of rolling out new network infrastructure, services, or applications to a production environment.

Commonly used in Networking, IT Management

Network Diagram

A network diagram is a visual representation of the components, connections, and interactions within a computer network. It helps network administrators and engineers visualize and understand the network topology, configuration, and dependencies.

Commonly used in Networking

Network Diameter

A measure of the longest distance between two nodes in a network, which can indicate the network’s size and complexity.

Commonly used in Networking, Network Design

Network Diction

The set of protocols and standards used for communication within a network.

Commonly used in Networking, Standards

Network Discovery

The process of identifying and mapping devices, resources, and services on a computer network.

Commonly used in Networking, Security

Network Diversification

The strategy of using multiple network paths and technologies to increase resilience and reduce the risk of network failure.

Commonly used in Networking, Security

Network Edge

The outermost layer of the network, closest to the end-users, where edge computing devices are located.

Commonly used in Networking, Edge Computing

Network Emulation

The technique of imitating the behavior of a network under various conditions, used for testing and analysis.

Commonly used in Networking, Testing

Network Encryption

The process of encoding data transmitted over a computer network to ensure its confidentiality and integrity.

Commonly used in Security, Cybersecurity

Network Endpoint

Any device or terminal that communicates over a network, such as computers, mobile devices, or IoT devices.

Commonly used in Networking, Security

Network Enforcer

A security appliance or software that ensures compliance with network policies and regulations by controlling access to the network.

Commonly used in Networking, Security

Network Engineering

The discipline concerned with designing, implementing, and managing computer networks.

Commonly used in Networking, IT Management

Network Enumeration

The process of retrieving user names, machine names, network resources, and other services from a network.

Commonly used in Networking, Security

Network Fabric

The interconnection of network elements and switches that are fully connected to each other.

Commonly used in Networking, Data Center

Network Fabrication

The process of creating a network topology, often in the context of virtualized or software-defined networking.

Commonly used in Networking, Network Design

Network Fading

A phenomenon in wireless communications where signal strength decreases due to environmental factors.

Commonly used in Networking, Wireless Communications

Network Federation

The process of linking together multiple networks or services to function as a single, unified system.

Commonly used in Networking, Cloud Computing

Network Firewall

A security device or software that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

Commonly used in Security, Cybersecurity

Network Flow

The sequence of packets from a source to a destination that is identified by a specific path or route.

Commonly used in Networking, Data Analysis

Network Forensics

Network forensics is the process of investigating and analyzing network traffic, logs, and activities to uncover evidence of security breaches, cyber attacks, or unauthorized activities within a computer network. It helps identify the source and impact of security incidents and support legal proceedings or incident response efforts.

Commonly used in Cybersecurity

Network Forensics Analysis Tool (NFAT)

Software tools used for capturing, recording, and analyzing network traffic to detect unauthorized access or malicious activity.

Commonly used in Networking, Security

Network Functions Virtualization

Network functions virtualization (NFV) is a network architecture approach that involves virtualizing networking services traditionally implemented in hardware, such as routers, firewalls, and load balancers, to improve scalability and flexibility.

Commonly used in Networking, Virtualization

Network Gateway

A network node equipped for interfacing with another network that uses different protocols.

Commonly used in Networking, Interoperability

Network Health Monitoring

The process of continuously monitoring a network for issues that could affect the performance and availability of network services.

Commonly used in Networking, IT Management

Network Hierarchy

The layered structure of a network, defining various levels of control, distribution, and access layers.

Commonly used in Networking, Network Design

Network Hub

A common connection point for devices in a network that uses broadcast to send data to all connected devices.

Commonly used in Networking, Hardware

Network Identification

The process or the means by which a network device or service is recognized and differentiated from others on a network.

Commonly used in Networking, Security

Network Infrastructure

The hardware and software components that enable communication, management, and connectivity in a computer network.

Commonly used in Networking

Network Interface

A network interface is a hardware or software component that enables a device to connect to a network. It provides the necessary physical or logical interface between the device and the network medium, allowing data transmission and reception.

Commonly used in Networking

Network Interface Card

A network interface card (NIC) is a hardware component that enables a computer to connect to a network, providing the necessary physical and data link layer interfaces for communication.

Commonly used in Networking, Hardware

Network Interface Card (NIC)

A hardware component that connects a computer or other device to a network, allowing it to send and receive data.

Commonly used in Networking

Network Jitter

The variation in the time of arrival of packets over a network, which can affect the quality of streaming media and real-time communications.

Commonly used in Networking, Performance Management

Network Kernel Extension (NKE)

A module that can be loaded into the kernel of an operating system to extend its networking capabilities.

Commonly used in Networking, Operating Systems

Network Layer

The network layer is the third layer of the OSI model and is responsible for routing packets across different networks to their destination. It determines the best path for data transmission and handles logical addressing and packet forwarding.

Commonly used in Networking

Network Licensing

A software licensing model that allows users to access software over a network, often based on the number of concurrent users.

Commonly used in Software Development, Licensing

Network Load Balancing

The process of distributing network traffic across multiple servers or network links to optimize resource utilization, reliability, and responsiveness.

Commonly used in Networking

Network Management

The administration and maintenance of computer networks to ensure their efficient operation, security, and reliability.

Commonly used in Networking

Network Management System (NMS)

A set of tools and applications designed for managing, monitoring, and maintaining computer networks.

Commonly used in Networking, IT Management

Network Mapping

The study of the physical connectivity of networks e.g., internet.

Commonly used in Networking, Security

Network Mapping Tool

Software used to visualize the layout and connections of a network, aiding in analysis and troubleshooting.

Commonly used in Networking, IT Management

Network Mashup

The combination of data or functionality from multiple sources over the network to create a new service or application.

Commonly used in Web Development, APIs

Network Modeling

The process of creating a mathematical model of a network to study its behavior under different scenarios.

Commonly used in Networking, Analysis

Network Modularization

The design principle of structuring a network into discrete modules to simplify management, enhance scalability, and improve resilience.

Commonly used in Networking, Design

Network Monitor

Software or hardware that observes and analyzes network traffic for performance evaluation, security monitoring, or troubleshooting.

Commonly used in Networking, Security

Network Monitoring

The process of observing and analyzing network traffic to ensure optimal performance, security, and availability.

Commonly used in Networking, Security

Network Operating System (NOS)

A network operating system (NOS) is software that provides the infrastructure and services necessary for computers to communicate and share resources in a network. Examples include Windows Server, Linux, and Novell NetWare.

Commonly used in Networking

Network Operations Center (NOC)

A centralized location where IT professionals directly support the efforts of remote monitoring and management software.

Commonly used in Networking, IT Management