Glossary

This glossary of network terms specifically highlights network management and monitoring processes. Explore these key terms and concise definitions.

A

Access Control List (ACL)

An ACL applies rules to switch ports or (Internet Protocol) IP addresses available to a host or switch. The rules determine whether or not packets can flow through those ports or IPs.

Back to top

Acknowledgement (ACK)

A signal passed between communication processes to signify response recipience as part of a communications protocol.

Back to top

Active Directory

A directory service that Microsoft developed for Windows domain networks.

Back to top

Active Monitor

A network node that is responsible for management tasks.

Back to top

Amazon Web Services (AWS)

Comprehensive, evolving cloud computing platform provided by Amazon.

Back to top

Apache

Popular open-source web server.

Back to top

Application Discovery, Tracing, and Diagnostics (ADTD)

A new dimension of application performance that combines three dimensions of APM, which are application topology discovery and visualization, User-defined transaction profiling, and Application component deep-dive.

Back to top

Application Performance Monitoring (APM)

An area of IT that focuses on monitoring the performance of software application programs in order to provide end-users with a quality experience.

Back to top

Application Programming Interface (API)

A set of subroutine definitions, protocols, and tools for building application software. These include, but aren’t limited to, Microsoft Windows API, C++ Standard Template Library, and Java APIs.

Back to top

Application Topology Discovery and Visualization

An NM tool that allows you to detect your entire web environment, visualize it into a single interactive infographic, and learn about your network environment’s performance without ignoring performance anomaly identification.

Back to top

B

Bandwidth

A measurement of the number of bits conveyed or processed (bit-rate) that are available or consumed in metric multiples of bits per second.

Back to top

Bit

Smallest unit of data in a computer.

Back to top

Bridge

Device that connects two or more networks together.

Back to top

Broadcast

Message sent to all devices on a network.

Back to top

Browser Real-User Monitoring

An network monitoring tool that allows you to track end-to-end user activity for all web-based applications during network user sessions.

Back to top

C

Client

Device or software application that requests services from a server.

Back to top

Cloud

Network of remote servers hosted on the internet and used to store, manage, and process data.

Back to top

Cloud Computing

An IT model that enables configurable resources (computer networks, servers, applications, etc.) from users and enterprises to allow computing capabilities, such as storage or processing, with minimal management.

Back to top

Cloud Migration

The process of moving data, applications or other business elements from an organization’s onsite computers to the cloud.

Back to top

Cluster

Group of computers that work together to provide high availability.

Back to top

Common Management Information Services (CMIS)

An OSI network management service interface used to monitor and control different computing systems.

Back to top

Communications Protocol

System of allowing multiple entities of a communications system to transmit information via any kind of physical quantity variations.

Back to top

D

Data Consolidation

Method of IT management that reduces the size of a single facility, or merges one or more facilities to reduce overall operating costs and reduce IT footprint.

Back to top

Data Exfiltration

The unauthorized transfer of data from a computer.

Back to top

Data-flow Analysis

Gathering information about a program’s possible values, then using a control flow graph to determine optimization methods for the program.

Back to top

Database

Collection of data that can be accessed by computers.

Back to top

Database Server

Server that stores and manages data in a database.

Back to top

Datacenter

Facility used to house networking equipment and other computer systems.

Back to top

Device Driver

A computer program that tells the OS how to communicate with a piece of hardware.

Back to top

Disk I/O (Input/Output)

A measurement of how much activity the server’s disks are experiencing, which is measured in terms of megabytes per second.

Back to top

Domain Name Servers

Domain Name Servers: The main directory of domain names which are then translated into Internet Protocol (IP) addresses.

Back to top

Dynamic Host Configuration Protocol (DHCP)

A way to automatically assign IP addresses and settings to a network device.

Back to top

E

End User Experience Monitoring (EUEM)

A functionality that allows you to monitor the actual end user experience of any network component on any device.

Back to top

Enterprise Mobility Management (EMM)

The set of people, processes, and technology focused on managing mobile devices, wireless networks, and other mobile computing services in a business context.

Back to top

H

Hypertext Transfer Protocol (HTTP)

Protocol used to transfer web pages and other files on the World Wide Web.

Back to top

Hypertext Transfer Protocol Secure (HTTPS)

Secure version of HTTP that is used to transfer sensitive data, such as credit card numbers.

Back to top

I

Information Technology (IT)

The application that allows computers to store, study, retrieve, transmit, and manipulate data.

Back to top

Internet Protocol (IP)

The principal communications protocol for sending and receiving datagrams across network boundaries, connecting multiple networks together across the Internet.

Back to top

Internet Service Provider (ISP)

Company that provides access to the internet.

Back to top

L

Legacy System

Legacy System: Of relating to an old/previous/outdated computing system.

Back to top

Local Area Network (LAN)

A computer network that connects devices within a limited space (schools, college campuses, office buildings, etc.)

Back to top

N

Network Access Control (NAC)

A set of protocols to define and implement a policy that describes how to secure access to network nodes by devices when they initially attempt to access the network.

Back to top

Network Monitoring

Using a system to constantly monitor a computer network(s) for hinderances or failures in the network’s components, which are then notified to network administrators for quick remediation.

Back to top

Network Scanning

A procedure for identifying active hosts on a network, either for the purpose of attacking them or for network security assessment.

Back to top

Node

An active electronic device that is attached to a network, and it’s capable of creating, receiving, or transmitting information over a communications channel.

Back to top

P

Ping

A utility to determine whether a specific IP Address is available.

Back to top

R

Real-Time Analytics

The ability to use all available enterprise data as needed and usually involves streaming data that allows users to make decisions on the fly.

Back to top

S

Secure Sockets Layer (SSL)

The industry standard for transmitting secure data over the Internet. It is based on a system of trusted certificates issued by certificate authorities and recognized by servers.

Back to top

Service Level Agreement (SLA)

A contract between a service provider or vendor and the customer that defines the level of service expected. SLAs are service-based and specifically define what the customer can expect to receive.

Back to top

Software Application Architecture

The process of defining a structured solution that meets all of the technical and operational requirements, while optimizing common quality attributes such as performance, security, and manageability.

Back to top

Software as a Service (SaaS)

A software delivery model in which software is licensed on a subscription basis and is centrally hosted and typically accessed by end-users using a client via web browser.

Back to top

Structured Query Language (SQL)

Standard language for accessing and manipulating databases.

Back to top

T

Transmission Control Protocol (TCP)

Protocol used to transfer data over a network.

Back to top

U

User Datagram Protocol (UDP)

Protocol used to transfer data over a network.

Back to top

V

Virtual LAN (VLAN)

Separate virtual networks on the same physical network; network packets are tagged so traffic flows to the appropriate VLAN. This lets you keep network applications separate despite being connected to the same physical network and doesn’t require multiple sets of cabling and networking devices to be deployed.

Back to top

Virtual Network

An isolated or abstracted network within a larger network.

Back to top

Virtual Private Network (VPN)

Technique used to create a secure connection between two or more devices over a public network.

Back to top

W

Web Server

A computer system that processes requests via Hypertext Transfer Protocol (HTTP), the basic network protocol used to distribute information on the internet.

Back to top

Wi-Fi Protected Access (WPA)

Security protocol for wireless networks. It’s an improvement over WEP and is required for networks that use 802.11n.

Back to top

Wireless Access Point (WAP)

Device that connects wireless devices to a wired network.

Back to top

Start monitoring in a minute

It’s essential to monitor your website’s performance. Just one minute of downtime can cost your business thousands of dollars. Imagine the losses as the minutes stretch into hours or even days.