In today’s rapidly evolving digital world, the internet is no longer a luxury but a fundamental part of daily life. From remote work to digital learning, streaming entertainment to smart home technologies, the breadth of internet applications is vast and continually expanding. The terminology accompanying these digital innovations can often be as complex as the technology itself. Whether you’re a tech enthusiast, a professional seeking to enhance your digital literacy, or simply a curious individual navigating the world wide web, understanding these terms is essential.
Our comprehensive “Broadband & Internet Glossary of Terms” serves as your definitive guide to demystifying the jargon. We’ve gathered an extensive list of terms, definitions and meanings to help you understand what broadband and internet technologies are about. From basic concepts like ‘bandwidth’ and ‘DSL’ to ‘Latency’ and ‘Fibre Optics,’ this glossary aims to convert confusing technical language into clear, understandable information.
We will continue to expand this list of terms on an ongoing basis. We also soon allow you to request terms to be added to this list.
Enjoy!
4
- 4G Long Term Evolution (LTE)
5
- 5G
- 5G Wireless Broadband
8
- 802.11
a
- A/B Testing
- Access Control
- Access Network
- Access Point
- Access Protocol
- Access Time
- ACL (Access Control List)
- Active Directory
- Active FTP
- Active Optical Network (AON)
- Adaptive Bitrate Streaming
- Address Resolution
- ADSL (Asymmetric Digital Subscriber Line)
- Advanced Encryption Standard (AES)
- Advanced Mobile Phone System (AMPS)
- Aerial Cable
- Aggregate Bandwidth
- Aggregate Data Rate
- AI (Artificial Intelligence)
- All-in-One Modem
- Always On
- Analog Modem
- Anisotropic Network
- Anti-Malware
- Antivirus
- API Gateway
- Application Layer
- Application Layer Firewall
- Application-Layer Gateway (ALG)
- Application Programming Interface (API)
- Application Proxy
- Application Service Provider (ASP)
- Application-Specific Integrated Circuit (ASIC)
- APT (Advanced Persistent Threat)
- Archival Storage
- ARP (Address Resolution Protocol)
- Artifact
- Asynchronous Data Transfer
- Asynchronous Transfer Mode (ATM)
- Attenuation
- Attenuation Coefficient
- Authentication
- Authentication Header (AH)
- Authorization
- Automatic Private IP Addressing (APIPA)
- Automatic Repeat Request (ARQ)
- Autonegotiation
- Autonomous System (AS)
- Autonomous System Border Router (ASBR)
- Autonomous System Number (ASN)
- Availability
- Availability Service Edge (ASE)
b
- Backbone Router
- Backdoor
- Backhaul
- Backplane
- Backscatter
- Bandplan
- Bandwidth
- Bandwidth Allocation
- Bandwidth Allocation Control Protocol (BACP)
- Bandwidth Starvation
- Bandwidth Throttling
- Base Station
- Basestation Controller (BSC)
- BASH (Bourne Again Shell)
- Basic Input/Output System (BIOS)
- Basic Service Set (BSS)
- Baud Rate
- BER (Bit Error Rate)
- Best Effort Delivery
- BGP (Border Gateway Protocol)
- Bidirectional Transmission
- Big Data Analytics
- Billed Echoed Mode (BEM)
- Binarily Transposed Data
- Binary Large Object (BLOB)
- Binary Synchronous Communication (BSC)
- Binary Tree
- Biometric Authentication
- Bit Bucket
- Bit Error Rate (BER)
- Bitrate
- Bits Per Second (bps)
- Bitstream
- Blade Server
- Block Cipher
- Blockchain
- Blocking Probability
- Blog
- Bluetooth
- Bluetooth LE (Low Energy)
- Bootstrap Protocol (BOOTP)
- Border Gateway
- Border Gateway Protocol (BGP)
- Border Gateway Protocol (BGP-4)
- Botnet
- Bottleneck Bandwidth
- Bricking
- Bridge Protocol Data Unit (BPDU)
- Bridged Network
- Broadband Aggregator
- Broadband Amplifier
- Broadband Gateway Router
- Broadband Modem
- Broadband Over Power Lines (BPL)
- Broadband Technology
- Broadcast Address
- Broadcast Domain
- Broadcast Storm
- Broken Link
- Brouter
- Browser
- Browser Cache
- Browser Extension
- Browser Hijacker
- Brute Force Attack
- Buffer Overflow
- Buffering
- Built-In Self-Test (BIST)
- Burst Mode
- Burst Transmission
- Business Internet
- Business-to-Business (B2B)
- Bytecode
c
- Cable Internet
- Cable Modem Termination System (CMTS)
- Cable Plant
- Cable Service Provider
- Cache Memory
- Caching
- Captive Portal
- Carrier Aggregation
- Carrier Ethernet
- Carrier Grade NAT (CGN)
- Carrier-Sense Multiple Access (CSMA)
- Carrier-Sense Multiple Access with Collision Avoidance (CSMA/CA)
- Carrier-Sense Multiple Access with Collision Detection (CSMA/CD)
- Cascading Style Sheets (CSS)
- Cat5 Cable
- Cat6 Cable
- Cat7 Cable
- CDN Cache
- CDN (Content Delivery Network)
- Cell Tower
- Cellular Backhaul
- Cellular Network
- Center Frequency
- Centralized Network
- Certified Information System Security Professional (CISSP)
- Certifying Authority (CA)
- Chaining Mode
- Challenge-Handshake Authentication Protocol (CHAP)
- Channel Bonding
- Channel Capacity
- Channel Frequency Response
- Checksum
- Chip Rate
- Chipset
- Choke Point
- Circuit Board
- Circuit Emulation Service (CES)
- Circuit Group
- Circuit Management
- Circuit Provisioning
- Circuit Switching
- Circuit Switching Data (CSD)
- Circuit Switching Network
- CISCO Discovery Protocol (CDP)
- Cisco VG Series
- Class of Service (CoS)
- Classless Inter-Domain Routing (CIDR)
- Clear Channel
- Clickstream
- Client Isolation
- Client-Server
- Client-Side
- Closed Network
- Cloud Application
- Cloud Computing
- Cloud Storage
- Coaxial Cable
- Coaxial Cable Network
- Coaxial Connector
- Collision Detection
- Collision Domain
- Collocated Hosting
- Command Execution
- Command-Line Interface (CLI)
- Common Channel Signaling (CCS)
- Communication Channel
- Communication Overhead
- Communication Protocol
- Communication Protocol Suite
- Communication Range
- Communication Subnetwork
- Communication System
- Community Antenna Television (CATV)
- Compression
- Compression Techniques
- Computational Network
- Concentrator
- Concentric Conductors
- Concurrency Control
- Concurrent Connection
- Congestion Window
- Connection Establishment
- Connection-Oriented Protocol
- Connectionless Communication
- Connectivity
- Connectivity Assurance
- Connectivity Layer
- Constellation Diagram
- Content Addressable Memory (CAM)
- Content Aggregator
- Content Caching Engine
- Content Delivery System
- Content Distribution
- Content Filtering
- Content Filtering Software
- Content Switching Module
- Contention Window
- Context-Based Access Control (CBAC)
- Continuous Availability
- Control Panel
- Control Plane
- Convergence
- Convergence Time
- Cookie
- Coordination Function
- Coordination Protocol
- Core Network
- Core Network Aggregation
- Core Services
- Corporate Intranet
- Coverage Area
- Crash Recovery
- CRC (Cyclic Redundancy Check)
- Cross-Connection
- Cross-Layer Design
- Cross-Site Scripting
- Cross-Talk
- Crossbeam
- Crossconnect
- Cryptanalysis
- Crypter
- Cryptographic Hash
- Cryptographic Key
- Cryptographic Service Provider (CSP)
- Cryptographic Synchronization
- Customer Edge (CE)
- Customer-Premises Equipment (CPE)
- Customer Premises Equipment (CPE)
- Customer Premises Network (CPN)
- Customer Relationship Management (CRM)
- Cyber Defense
- Cyber Threat Intelligence (CTI)
- Cyberattack
- Cyberattack Simulation
- Cybersecurity
- Cyclic Prefix
- Cyclic Redundancy Code (CRC)
d
- Dark Fiber
- DAS (Distributed Antenna System)
- Data Aggregation
- Data Breach
- Data Burst
- Data Cap
- Data Center
- Data Classification
- Data Compression Algorithm
- Data Control Language (DCL)
- Data Conversion
- Data Correlation
- Data Encryption
- Data Encryption Algorithm (DEA)
- Data Encryption Key (DEK)
- Data Encryption Standard (DES)
- Data Fragmentation
- Data Frame
- Data Integrity
- Data Interchange Format (DIF)
- Data Link Layer
- Data Logging
- Data Loss Prevention (DLP)
- Data Mining
- Data Mirroring
- Data Modeling
- Data Over Cable Service Interface Specification (DOCSIS)
- Data Overhead
- Data Overhead Control
- Data Packet
- Data Plane
- Data Plane Development Kit (DPDK)
- Data Privacy
- Data Redundancy
- Data Replica
- Data Scrubbing
- Data Security
- Data Segmentation
- Data Synchronization
- Data Token
- Data Traffic Analyzer
- Data Transfer Rate
- Data Validation
- Data Versioning
- Data Visualization
- Data Warehouse
- Datagram
- DCOM (Distributed Component Object Model)
- DDoS (Distributed Denial of Service)
- DDoS Mitigation
- Decentralized Network
- Decryption
- Decryption Key
- Dedicated Hosting
- Dedicated Infrastructure
- Deep Learning (DL)
- Deep Packet Inspection (DPI)
- Defense-in-Depth
- Demultiplexer
- Denial-of-Service (DoS)
- Dense Wavelength Division Multiplexing (DWDM)
- Deregister
- Deregistration
- Designated Router (DR)
- Destination Network
- Destination Unreachable
- Device Fingerprinting
- Device Identifier
- Device-Level Security
- Device Management
- Device Pairing
- Device Port
- Device Type
- DHCP (Dynamic Host Configuration Protocol)
- Dial-Up
- Dial-Up Internet
- DiffServ (Differentiated Services)
- Digital Access
- Digital Data Service (DDS)
- Digital Footprint
- Digital Object Identifier (DOI)
- Digital Rights
- Digital Rights Management (DRM)
- Digital Signature Algorithm (DSA)
- Digital Twin
- Digital Twin Network
- Digital Waveguide
- Direct Memory Access (DMA)
- Direct Sequence
- Direct Sequence Spread Spectrum (DSSS)
- Directional Antenna
- Directories API
- Directory Harvest Attack (DHA)
- Directory Service
- Disaster Recovery
- Disconnected Operation
- Disk Striping
- Distance Vector Routing Protocol
- Distributed Antenna
- Distributed Control System (DCS)
- Distributed Denial of Service (DDoS)
- Distributed Ledger
- Distributed Network
- Distribution Cable
- Dithering
- DLL (Dynamic Link Library)
- DMZ (Demilitarized Zone)
- DNA (Digital Network Architecture)
- DNS Amplification Attack
- DNS Cache
- DNS Cache Poisoning
- DNS (Domain Name System)
- DNS Filter
- DNS Lookup
- DNS Resolver
- DNS Sinkhole
- DNS Spoofing
- Domain Authority
- Domain Boundary
- Domain Controller
- Domain Generation Algorithm (DGA)
- Domain Mapping
- Domain Name
- Domain Name Registration
- Domain Name Service (DNS)
- Domain Ownership
- Domain Transfer
- Domain Validation
- Downlink
- Download Speed
- Downsampling
- Downstream
- Downward Compatibility
- DSL (Digital Subscriber Line)
- DSL Filter
- Dual-Homed
- Dual-Stack Network
- Dual-Tone Multi-Frequency (DTMF)
- Duplex Communication
- Duplexer
- Dynamic Addressing
- Dynamic Bandwidth Allocation (DBA)
- Dynamic Content
- Dynamic Data Exchange (DDE)
- Dynamic DNS
- Dynamic DNS (DDNS)
- Dynamic Host Configuration Protocol (DHCP)
- Dynamic IP
- Dynamic Network Configuration
- Dynamic Parallelism
- Dynamic Phase Alignment
- Dynamic Routing
- Dynamic Routing Protocol
- Dynamic Service
- Dynamic Switching
- Dynamic VLAN
- Dynamic Web
- Dynamic Website
- Dynamic Windows
e
- E-LAN (Ethernet LAN)
- E-Line (Ethernet Line)
- E-Tree (Ethernet Tree)
- Earliest Deadline First (EDF)
- eBGP (External BGP)
- Edge-Aware Networking
- Edge Computing
- Edge Computing Framework
- Edge Device
- Edge Device Security
- Edge Gateway
- Edge Network
- Edge Node
- Edge Router
- Edge Router Protocol (ERP)
- Edge Security Controller (ESC)
- Edge Switch
- Edge Tier
- Edge-to-Edge (E2E)
- Edge Transport Server
- Edge Virtual Bridging (EVB)
- EIGRP (Enhanced Interior Gateway Routing Protocol)
- Elastic Network
- Elastic Resource Management
- Elastic Search Engine
- Electromagnetic Interference (EMI)
- Elliptic Curve Cryptography (ECC)
- Elliptic Curve Cryptosystem (ECC)
- Embedded Network
- Embedded Systems
- Emergency Communications Network
- Encapsulating Security Payload (ESP)
- Encapsulation
- Encryption Algorithm
- Encryption Key Management
- End Host
- End Point Protection
- End System
- End-to-End Encryption
- End-to-End Encryption (E2EE)
- Endpoint Security
- Energy Efficiency in Data Networks
- Enterprise Bus
- Enterprise Cloud
- Enterprise Data Management
- Enterprise DNS
- Enterprise Network Gateway
- Enterprise Networking
- Enterprise Resource Planning (ERP)
- Enterprise Security Architecture
- Enterprise WLAN
- Entity Authentication
- Entry-Level Switch
- Enueue
- Environmental Monitoring
- Equalization
- Equipment Identity Register (EIR)
- Error Detection Algorithm (EDA)
- Error Handling
- Ethernet
- Ethernet Cable
- Ethernet Demarcation Device (EDD)
- Ethernet Frame
- Ethernet Hub
- Ethernet Light Interface (ELI)
- Ethernet Over Copper
- Ethernet Over IP (EoIP)
- Ethernet Over SDH (EoS)
- Ethernet Physical Layer
- Ethernet Powerlink (EPL)
- Ethernet Switch
- Event Distribution Gateway
- Event-Driven Programming
- Evolution Data Optimized (EV-DO)
- Exa-Scale
- Exact Match Lookup (EML)
- Exception Handling
- Exclusive OR (XOR)
- Exponential Backoff
- Extensible Authentication Protocol (EAP)
- Extensible Firmware Interface (EFI)
- Extensible Messaging and Presence Protocol (XMPP)
- External Filtering
- External Hard Drive
- Extranet
- Extranet Gateway
f
- Fading
- Failover
- Failover Cluster
- Fair Queuing
- Fallback Mechanism
- Fast Ethernet (FE)
- Fast Packet Switching
- Fault Tolerance
- Fiber Access Terminal
- Fiber Distributed Data Interface (FDDI)
- Fiber Distribution Terminal
- Fiber Node
- Fiber Optic Communication
- Fiber Optic Splice Closure
- Fiber Optic Termination Box
- Fiber Optics
- Fiber to the Building (FTTB)
- Fiber to the Curb (FTTC)
- Fiber-to-the-Home
- Fiber to the Home (FTTH)
- Fiber to the Node (FTTN)
- Fiber to the Office (FTTO)
- Fibre Channel Over IP (FCIP)
- Field Area Network (FAN)
- Field Programmable Gate Array (FPGA)
- Field Termination
- File Allocation Table (FAT)
- File-Based Encryption
- File Descriptor
- File Mirroring
- File Server
- File Sharing
- File Transfer Protocol (FTP)
- File Transfer Protocol Secure (FTPS)
- Filtering Service
- Firewall
- Firewall Appliance
- Firewall Rule
- Firmware Image
- Firmware Over The Air (FOTA)
- Fixed Mobile Convergence (FMC)
- Fixed Wireless
- Fixed Wireless Access (FWA)
- Flexible Service Plan
- Flow-Based Load Balancing
- Flow Control Mechanism
- Flow Label Switching
- Fog Computing
- Forward Collision Avoidance
- Forward Error Correction (FEC)
- Forwarding Information Base (FIB)
- Frame Aggregation
- Frame Check Sequence (FCS)
- Frame Error Rate
- Frame Relay
- Frequency Allocation
- Frequency Band
- Frequency-Division Duplexing (FDD)
- Frequency Division Multiple Access (FDMA)
- Frequency Hopping
- Frequency Hopping Spread Spectrum (FHSS)
- Frequency Reuse
- FTP (File Transfer Protocol)
- Full-Duplex
- Full Duplex Communication
- Full Duplex Ethernet
- Full-Duplex Ethernet
- Full Mesh
- Full Mesh Network
- Full Path Redundancy
- Fully Meshed Network
- Fully Qualified Domain Name (FQDN)
- Function-as-a-Service (FaaS)
- Fuzzing
g
- Gateway
- Gateway Configuration
- Gateway Interface
- Gateway Load Balancer
- Gateway Protocol
- Gateway Router
- General Packet Radio Service (GPRS)
- Generic Routing Encapsulation (GRE)
- Geostationary Orbit
- Gigabit Ethernet
- Gigabit Passive Optical Network (GPON)
- Gigabits per second (Gbps)
- Global Authentication
- Global Load Balancing
- Global Positioning System (GPS)
- Global Routing
- Global Unicast Address
- GNU Hurd
- GNU Privacy Guard (GPG)
- Godaddy
- Governing Router
- Graphical User Interface (GUI)
- Guided Transmission Medium
h
- Half Duplex Communication
- Handoff Protocol
- Handover
- Hardware Abstraction Layer (HAL)
- Hardware Security Module (HSM)
- Hash-Based Message Authentication Code (HMAC)
- Hash Function
- Hash Function Generator
- Hashed Timed Payment Contract (HTPC)
- Hazard-Free Network
- HCI (Host Controller Interface)
- Head-End Device
- Head-of-Line (HOL) Blocking
- Headend
- Header Compression
- HFC (Hybrid Fiber-Coaxial)
- High Availability (HA)
- High-Speed Downlink Packet Access (HSDPA)
- High-Speed Uplink Packet Access (HSUPA)
- Highest Occupied Subchannel
- Hill Climbing Algorithm
- Home Gateway Device
- Home Network
- Horizontal Split
- Host-to-Host Layer
- Hosting Provider
- Hostname
- Hotspot
- HSDPA (High-Speed Downlink Packet Access)
- HSRP (Hot Standby Router Protocol)
- HTTP (HyperText Transfer Protocol)
- HTTPS (HyperText Transfer Protocol Secure)
- Hubs
- Hybrid Cloud
- Hybrid Fiber-Coaxial (HFC)
- Hybrid Networking
- HyperText Markup Language (HTML)
- Hypertext Transfer Protocol (HTTP)
- Hypervisor-Based Virtualization
i
- I/O Controller Hub (ICH)
- IaaS (Infrastructure as a Service)
- IANA (Internet Assigned Numbers Authority)
- ICANN (Internet Corporation for Assigned Names and Numbers)
- Identity Access Management (IAM)
- Identity Service Engine (ISE)
- IEEE 802.1Q
- IEEE 802.11ad
- IEEE 802.11ax
- IEEE 802.16
- IEEE 1394 (FireWire)
- IETF (Internet Engineering Task Force)
- IGMP (Internet Group Management Protocol)
- IGMP Snooping
- Image Map
- Immediate Addressing
- Impulse Noise
- In-Band Management
- In-Memory Database (IMDB)
- Inferencing
- Information Leak
- Infrared Communication
- Infrastructure-as-a-Service (IaaS)
- Ingress Filtering
- Initial Sequence Number
- Inline Data Deduplication
- Inline DDoS Mitigation
- Inline Encryption
- Inline Network Appliance
- Inline Signature Detection
- Input-Output Module (IOM)
- Integrated Access Device (IAD)
- Integrated Circuit Card Identifier (ICCID)
- Integrated Service Digital Network (ISDN)
- Intelligent Network Service
- Inter-Device Synchronization
- Inter-Switch Link (ISL)
- Inter-Symbol Interference
- Interactive Applications
- Interactive Voice Response (IVR)
- Interception Proxy
- Interface Descriptor Block (IDB)
- Interleaving
- Intermediate Distribution Frame (IDF)
- Intermodulation Distortion
- Internal Network Address Translation (INAT)
- Internationalized Domain Name (IDN)
- Internet Backbone
- Internet Control Message Protocol (ICMP)
- Internet Engineering Task Force (IETF)
- Internet Exchange Point (IXP)
- Internet Group Management Protocol (IGMP)
- Internet Key Exchange (IKE)
- Internet Message Access Protocol (IMAP)
- Internet Protocol (IP)
- Internet Protocol Security (IPsec)
- Internet Relay Chat (IRC)
- Interoperability
- Interworking Function (IWF)
- Intrusion Detection and Prevention System (IDPS)
- Intrusion Detection System (IDS)
- Intrusion Prevention System (IPS)
- IntServ (Integrated Services)
- IoT (Internet of Things)
- IP Address
- IP Address Block (IPAB)
- IP Address Management (IPAM)
- IP Address Spoofing
- IP Multimedia Core Network Subsystem (IMS)
- IP Multimedia Subsystem (IMS)
- IP Network-to-Network Interface (NNI)
- IP Office
- IP Phones
- IP Surveillance
- IP Telephony
- IP Tunneling Protocol
- IPv4 (Internet Protocol version 4)
- IPv6 (Internet Protocol version 6)
- IS-IS (Intermediate System to Intermediate System)
- ISAKMP (Internet Security Association and Key Management Protocol)
- ISDB (Integrated Services Digital Broadcasting)
- ISDN (Integrated Services Digital Network)
- ISDN User Part (ISUP)
- Island-Hopping Attack
- ISO/OSI Reference Model
- ISP (Internet Service Provider)
- ISP Peering
- IT Asset Management (ITAM)
- IT Infrastructure Library (ITIL)
- IT Service Management (ITSM)
- ITSP (Internet Telephony Service Provider)
- ITU-T (International Telecommunication Union – Telecommunication Standardization Sector)
j
- Jitter
- Jitter Buffer
- Jitter Control
- Jitter Measurement
- JSON (JavaScript Object Notation)
k
- Keepalive Timer
- Key Derivation Function (KDF)
- Key Distribution Center (KDC)
- Key Exchange
- Key Management Infrastructure (KMI)
- Key Management Protocol
- Key Rotation Policy
- Key Schedule
- Keypad Effort
- Keyspace
- Knowledge-Based Authentication (KBA)
- Kubernetes
l
- LAN (Local Area Network)
- Latency
- Latency Budget
- Latency Criterion
- Latency Jitter
- Latency Sensitivity
- Latency Variation
- Layer 2 Forwarding
- Layer 2 Switch
- Layer 3 Firewall
- Layer 3 Switch
- Layer2/Layer3 Switch
- LC-AS (Link Capacity Adjustment Scheme)
- Leased Access
- Leased Bandwidth
- Leased Line
- Least Bit Error Rate (LBER)
- Least Cost Routing
- Legal Intercept
- Let’s extend this list further for you:
- Lightweight Access Point Protocol (LWAPP)
- Lightweight Directory Access Protocol (LDAP)
- Link Adaptation
- Link Aggregation Control Protocol (LACP)
- Link Aggregation Group (LAG)
- Link Authentication
- Link Compression
- Link Control Protocol (LCP)
- Link Layer Protocol
- Linked Open Data
- Linux Container
- Load Balancing
- Load Distribution
- Load Shedding
- Local Area Network (LAN)
- Local Breakdown
- Local Exchange Carrier (LEC)
- Local Interface
- Local Loop
- Local Loop Unbundling (LLU)
- Local Management Interface (LMI)
- Local Network Interface (LNI)
- Lockstep Protocol
- Logical Channel
- Logical Link Control (LLC)
- Logical Network Configuration
- Logical Ring
- Long-Distance Ethernet
- Long-Haul Network
- Long-Haul Transmission
- Long Term Evolution (LTE)
- Loopback Test
- Low-Latency Queuing (LLQ)
- Lower-Layer Protocol
- LTE-Advanced (LTE-A)
- LTE Broadcast (eMBMS)
- LTE (Long Term Evolution)
m
- MAC Address Filtering
- MAC Address (Media Access Control Address)
- MAC Filtering
- MAC Protocol Data Unit (MPDU)
- Magnitude Modulation
- Mail Exchange (MX)
- Main Distribution Frame (MDF)
- Malware
- MAN (Metropolitan Area Network)
- Managed Hosting
- Managed Router Service
- Management Information Base (MIB)
- Mandatory Access Control (MAC)
- MANET (Mobile Ad hoc Network)
- Mapping Function
- Maximum Burst Size (MBS)
- Maximum Transmission Unit (MTU)
- Media Access Control (MAC)
- Media Gateway
- Media Gateway Control Protocol (MGCP)
- Media Independent Interface (MII)
- Media Oriented Systems Transport (MOST)
- Media Redirection
- Media Streaming Protocol
- Medical IoT (MIoT)
- Memory-Mapped I/O
- Mesh Network
- Mesh Network Topology
- Message Authentication Code (MAC)
- Message Digest Algorithm (MDA)
- Message Passing Interface (MPI)
- Message Queue
- Message Queue Telemetry Transport (MQTT)
- Message Transfer Agent (MTA)
- Messaging Layer Security
- Meta-Directory
- Metro Ethernet Forum (MEF)
- Metropolitan Area Network (MAN)
- Metropolitan Ethernet
- Microbroadcasting
- Microcontroller Unit (MCU)
- Microsegmentation
- Microwave Backhaul
- Microwave Communication
- Middleware Appliance
- Millimeter Wave
- Mine Resistant Ambush Protected (MRAP)
- Mission-Critical Network
- Mixed-Mode Network
- Mobile Access Gateway (MAG)
- Mobile Backhaul
- Mobile Broadband
- Mobile Edge Computing (MEC)
- Mobile Internet
- Mobile Internet Protocol (MIP)
- Mobile IP Version 6 (MIPv6)
- Mobile Network Access
- Mobile Network Code (MNC)
- Mobile Network Gateway (MNG)
- Mobile Network Operator (MNO)
- Mobile Subscriber Unit (MSU)
- Mobile Virtual Network Operator (MVNO)
- Mobile Web Browser
- Modbus Protocol
- Modem
- Modular Network
- Modulation
- Modulation Techniques
- MPLS (Multiprotocol Label Switching)
- MTU (Maximum Transmission Unit)
- Multi-channel Multipoint Distribution Service (MMDS)
- Multi-domain Networking
- Multi-Mode Fiber (MMF)
- Multi-Protocol Label Switching (MPLS)
- Multi-Vendor Integration
- Multiband Antenna
- Multicast
- Multicast Packet
- Multicast Source
- Multicast Transmission
- Multichannel Network
- Multidomain Network
- Multihoming
- Multinode Cluster
- Multipath Fading
- Multipath Interference
- Multipath Protocol
- Multiplexing
- Multipoint Relay (MPR)
- Multiprotocol BGP (MP-BGP)
- Multiprotocol Label Switching Traffic Engineering (MPLS TE)
- Multiprotocol Label Switching-Transport Profile (MPLS-TP)
- Multiservice Access Node (MSAN)
- Multistage Interconnection Network
- Multitenant Data Center
- Multithreading
- Municipal Broadband
- Municipality-Run Fiber Network
- Must-Carry Rules
n
- N/OFDM
- Name Resolution Protocol (NRP)
- Named Data Networking (NDN)
- Nanocell
- Nanocellular Network
- Narrowband Internet of Things (NB-IoT)
- Narrowband IoT (NB-IoT)
- NAS (Network Attached Storage)
- NAS (Network-Attached Storage)
- NAT (Network Address Translation)
- NAT Session
- NAT Traversal
- National Broadband Plan
- Native VLAN
- NBase-T
- Net Neutrality
- Network
- Network Abstraction Layer (NAL)
- Network Access System (NAS)
- Network Adapter
- Network Address
- Network Address Space
- Network Adjacency
- Network Architecture
- Network Architecture Specification
- Network Attached Device
- Network Authentication
- Network Awareness
- Network Backend
- Network Behavior Analysis (NBA)
- Network Behavioral Analysis (NBA)
- Network Boundary
- Network Boundary Protection
- Network Bridge
- Network Capacity
- Network Centric Operations (NCO)
- Network Centric Warfare (NCW)
- Network Cipher
- Network Configuration Management (NCM)
- Network Congestion
- Network Contact Point
- Network Convergence
- Network Convergence Time
- Network Core
- Network Core Layer
- Network Delay
- Network Density
- Network Dependency
- Network Determinism
- Network Diagnostics
- Network Diameter
- Network Discovery
- Network Distribution
- Network Dynamics
- Network Efficiency
- Network Efficiency Ratio (NER)
- Network Element
- Network Emulator
- Network Function Virtualization (NFV)
- Network Handoff
- Network Hopping
- Network Infrastructure
- Network Infrastructure Design
- Network Interface
- Network Interface Card (NIC)
- Network Interface Controller
- Network Intrusion Detection System (NIDS)
- Network Invisibilities
- Network Latency
- Network Latency Analysis
- Network Layer Address
- Network-Layer Reachability Information (NLRI)
- Network Load
- Network Load Balancer
- Network Loopback
- Network Management
- Network Management System (NMS)
- Network Mapper (Nmap)
- Network Mapping
- Network Maturity
- Network Mean Time Between Failures (MTBF)
- Network Measurement
- Network Media
- Network Model
- Network Monitoring
- Network Monitoring Tools
- Network Neutrality
- Network Node
- Network Node Interface (NNI)
- Network Ontology
- Network Operations
- Network Operations Center (NOC)
- Network Optimization
- Network Optimization Techniques
- Network Orchestration
- Network-Oriented Architecture (NOA)
- Network Output Queueing (NOQ)
- Network Partitioning
- Network Path
- Network Performance
- Network Plan
- Network Planning
- Network Policy
- Network Policy Definition
- Network Probe
- Network Profiling
- Network Protocol
- Network Protocol Analyzer
- Network Quality
- Network Quality Assessment
- Network Redundancy
- Network Reliability
- Network Replica
- Network Resilience
- Network Resiliency
- Network Resource Management
- Network Response Time
- Network Restoration
- Network Scalability
- Network Scalability Model
- Network Security
- Network Security Appliance
- Network Security Policy
- Network Segment
- Network Service Access Point (NSAP)
- Network Sharing
- Network Sideband
- Network Signature
- Network Simulation
- Network Slicing
- Network Slicing SDN
- Network Sniffer
- Network Softwarization
- Network Solution Architecture
- Network Span
- Network Speed
- Network Stability
- Network Stack
- Network Status
- Network Storage
- Network Stream
- Network Subnetting
- Network Subscriber
- Network Switch Fabric
- Network Synchronization
- Network Synchronization Protocol
- Network Taxonomy
- Network Threat Analysis
- Network Tiers
- Network Token
- Network Topology
- Network Traffic
- Network Traffic Escalation
- Network Traffic Filtering
- Network Traffic Profiling
- Network Traffic Shaping
- Network Transmission
- Network Transparence
- Network Troubleshooting
- Network Utilization
- Network Utilization Level
- Network Variability
- Network Virtualization
- Network Visibility
- New IP
- Next-Generation Broadband
- Next-Generation Firewall
- Next-Generation Firewall (NGFW)
- Next-Generation Network (NGN)
- Next-Generation Switching
- Next-Hop Self
- Node
- Noise Margin
- Non-Intrusive Monitoring
- Non-Repudiation
- Non-Unicast
- Northbound API
- Northbound Interface
- NSR (Nonstop Routing)
o
- OAuth (Open Authorization)
- Octet
- OFDMA (Orthogonal Frequency Division Multiple Access)
- Off-Board Processor
- Off-Net
- Off-Premises Extension (OPX)
- OLT (Optical Line Terminal)
- Omnidirectional Antenna
- Omnidirectional Antenna Systems
- On-Demand Bandwidth
- On-Demand Routing
- Onboard NIC
- One-Time Password (OTP)
- One-Way Delay (OWD)
- Open API
- Open Base Station Architecture Initiative (OBSAI)
- Open Circuit
- Open Network Computing (ONC)
- Open Network Switch (ONS)
- Open Networking
- Open Platform Management
- Open Shortest Path First (OSPF)
- Open Source
- Open Source Routing
- Open Systems Architecture
- Open vSwitch (OVS)
- Operating System (OS)
- Operating Systems Domain
- Operations Support System (OSS)
- Optical Cable
- Optical Carrier
- Optical Carrier Network
- Optical Circulator
- Optical Cross Connect (OXC)
- Optical Distribution Frame (ODF)
- Optical Distribution Network (ODN)
- Optical Fiber Cable
- Optical Ground Wire (OPGW)
- Optical Hop
- Optical Interface
- Optical Line Protection
- Optical Modulation
- Optical Multiplex Section (OMS)
- Optical Network Terminal (ONT)
- Optical Network Unit (ONU)
- Optical Node
- Optical Path Protection
- Optical Power Budget
- Optical Private Network
- Optical Reflection
- Optical Signal Noise Ratio (OSNR)
- Optical Splitter
- Optical Switch
- Optical Time-Division Multiplexing (OTDM)
- Optical Time Domain Reflectometer (OTDR)
- Optical Transport Network (OTN)
- Orthogonal Frequency-Division Multiplexing (OFDM)
- OSI Model
- Outside Plant
- Over-the-Top (OTT)
- Overlay Encapsulation
- Overlay Network
- OWASP ZAP
p
- P2P (Point-to-Point)
- Packet
- Packet Analyzer
- Packet Filtering
- Packet Forwarding
- Packet Injection
- Packet Inter-Network Groper (PING)
- Packet Loss
- Packet Over SONET/SDH (POS)
- Packet Path
- Packet Queuing
- Packet Radio Network
- Packet Relay
- Packet Sampling
- Packet Scheduling
- Packet Sniffing
- Packet Steering
- Packet Switched Network
- Packet Switching
- Packet Switching Fabric
- Packet Time-to-Live (TTL)
- Paired Spectrum
- Parallel Internet
- Parallel Processing
- Parity Bit
- Parity Check
- Passive Access Network (PAN)
- Passive Fiber Networks
- Passive Optical Network (PON)
- Passive Optical Splitter
- Passive Splitter
- Password Authentication
- Patch Cable
- Payload Compression
- Payload Data
- Paywall
- Peak Information Rate (PIR)
- Peak Throughput
- Peer-to-Peer (P2P)
- Peering
- Peering Agreement
- Peering Point
- Performance Metrics
- Peripheral Component Interconnect Express (PCIe)
- Permanent Virtual Circuit (PVC)
- Personal Area Network (PAN)
- Phishing
- Physical Address
- Physical Circuit
- Physical Layer
- Physical Layer Abstraction
- Physical Link Channel
- Physical Medium
- Physical Network
- Physical Network Layer
- Physical Network Topology
- Physical Security
- Ping
- PING
- Ping of Death
- Pinging
- PMSC
- Point of Interconnection (POI)
- Point of Presence (PoP)
- Point-to-Multipoint (P2MP)
- Point-to-Point Protocol (PPP)
- Point-to-Point Tunneling Protocol (PPTP)
- Policy-Based Management
- Policy-Based Routing (PBR)
- Policy Information Point (PIP)
- Policy Server
- Poor Man’s Wireless
- POP (Point of Presence)
- Port
- Port Aggregation
- Port Authentication
- Port Forwarding
- Port Forwarding Table
- Port Isolation
- Port Knock
- Port Mirroring
- Port Multiplexer
- Port Number
- Port Replicator
- Port Scanner
- Port Security
- Port Security Policy
- Port Sharing
- Position Error
- Position-Independent Code (PIC)
- Positioning Accuracy
- POTS (Plain Old Telephone Service)
- Power Backup
- Power Budget
- Power Divider
- Power Excursion
- Power Line Adapter
- Power over Ethernet (PoE)
- Power Over Ethernet (PoE)
- Power Spectrum Density (PSD)
- Power Supply Unit (PSU)
- Power Surge
- Powerline Adapters
- Powerline Communication
- Powerline Networking
- Precision Time Protocol (PTP)
- Predictive Modeling
- Predictive QoS
- Preemptive Handoff
- Preferred Routing
- Premises Cabling
- Premium Connectivity
- Presence Framework
- Presence Information
- Pretty Good Privacy (PGP)
- Primary Network
- Private Cloud
- Private Peering
- Proactive Network Management
- Proactive Network Optimization
- Proactive Security Management
- Processor Affinity
- Product Code Modulation (PCM)
- Programmable Network
- Proportional Fair Scheduling (PFS)
- Protection Switching
- Protocol Addressing
- Protocol Analyzer
- Protocol Conformance
- Protocol Converter
- Protocol Data Unit (PDU)
- Protocol Encryption
- Protocol Headers
- Protocol Router
- Protocol Stack
- Proximate Peer
- Proximity Network
- Proxy Agent
- Proxy ARP
- Proxy Server
- Public Access Point
- Public IP Address
- Public Key
- Public Key Exchange
- Public Key Infrastructure (PKI)
- Public Key Repository
- Public Land Mobile Network (PLMN)
- Public-Private Partnership (PPP)
- Public Safety Broadband Network (PSBN)
- Public Switched Telephone Network (PSTN)
- Pulse Code Modulation (PCM)
q
- QoE (Quality of Experience)
- QoS (Quality of Service)
- Quadrature Amplitude Modulation (QAM)
- Qualified Link
- Quality of Experience (QoE)
- Quality of Service Class Identifier (QCI)
- Quality of Supply
- Quantum Key Distribution (QKD)
- Quantum Networking
- Quasi-Synchronous Network
r
- RACF (Resource Access Control Facility)
- Radio Access Network (RAN)
- Radio Access Point
- Radio Bandwidth
- Radio Communication Network
- Radio Frequency Interference (RFI)
- Radio Gateway
- Radio Local Area Network (RLAN)
- Radio Network Controller (RNC)
- Radio Resource Management (RRM)
- Radio Tethering
- Radio Transport Network
- RADIUS (Remote Authentication Dial-In User Service)
- RAID (Redundant Array of Independent Disks)
- RARP (Reverse Address Resolution Protocol)
- Rate Limiting
- Read-Only Memory (ROM)
- Real-time Interactive Communications
- Real-time Streaming Protocol (RTSP)
- Real-Time Transport Protocol (RTP)
- Receive Window
- Recovery Time Objective (RTO)
- Recursive DNS Resolver
- Recursive Query
- Redundancy
- Redundancy Protocols
- Redundant Array of Independent Nodes (RAIN)
- Redundant Data Path
- Regional Area Network (RAN)
- Regional Internet Registry (RIR)
- Regional IP Network
- Registered Jack (RJ)
- Relative Signal Strength
- Remote Access
- Remote Access Management
- Remote Authentication
- Remote Configuration
- Remote Memory Access
- Remote Method Invocation (RMI)
- Remote Peering
- Remote Procedure Call (RPC)
- Remote Session
- Remote Shell (rsh)
- Remote Site
- Remote Terminal Unit (RTU)
- Remote Workforce Connectivity
- Rendezvous And Strata Establishment (RASE)
- Rendezvous Point
- Repeater Station
- Request for Comments (RFC)
- Rescue Channel
- Reserved Bandwidth
- Residual Error Rate
- Resource Address
- Resource Allocation Algorithm
- Resource Identifier
- Resource Metering
- Resource Reservation Protocol (RSVP)
- Resource Scheduling
- Return Loss
- Return Signal
- Reverse DNS Lookup
- Reverse Multiplexing
- Reverse-Path Forwarding
- Reverse Proxy
- Reverse Proxy Server
- Reversible Error
- RF Front-End
- RF (Radio Frequency)
- RF Spectrum Analyzer
- RF Test Equipment
- Ring Network
- Ring Topology
- RJ-45
- Robust Network
- Robustness Principle
- Root Certificate
- Root Name Server
- Round-Robin DNS
- Round-Trip Time (RTT)
- Route Aggregation
- Route Announcement
- Route Convergence
- Router Advertisement
- Router Advertisement (RA)
- Router Discovery
- Router Management
- Router Solicitation
- Routing Adjacency
- Routing Convergence
- Routing Cost
- Routing Domain
- Routing Information Base (RIB)
- Routing Logic
- Routing Metric
- Routing Module
- Routing Path
- Routing Protocol
- Routing Protocol Configuration
- Routing Rule
- Routing Scalability
- Routing Table
- Routing Table Entry
- Routing Table Limit
- Routing Table Update
- Routing Teardown
- Routing Telemetry
- Routing Traffic
- Routing Update Message
- RSS (Really Simple Syndication)
s
- SaaS (Software as a Service)
- Safety-Critical Networks
- SASE (Secure Access Service Edge)
- Satellite Antenna
- Satellite Broadband
- Satellite Downlink
- Satellite Earth Station
- Satellite Internet
- Satellite Internet Access
- Satellite Link
- Satellite Modem
- Satellite Network
- Satellite Transponder
- SCADA Network
- Scalability
- Scalable Network Architecture
- Scalable Vector Graphic (SVG)
- Scalable Vector Graphics (SVG)
- Scale-Up Network
- Scheduled Outage
- Scripting Interface
- SDSL (Symmetric Digital Subscriber Line)
- Secondary Network
- Secure Access Service Edge (SASE)
- Secure Browsing
- Secure Channel
- Secure Communication
- Secure Content
- Secure Data Connector
- Secure Digital (SD)
- Secure Download
- Secure Messaging
- Secure Shell (SSH)
- Secure Socket Tunneling Protocol (SSTP)
- Secure Tunneling
- Security Assertion Markup Language (SAML)
- Security Association (SA)
- Security Certificate
- Security Event Manager (SEM)
- Security Information and Event Management (SIEM)
- Security Key
- Security Management System
- Self-Signed Certificate
- Semi-Duplex
- Sensing Range
- Serial Communication
- Serial Line Internet Protocol (SLIP)
- Serial Network
- Server
- Server Capacity
- Server Collocation
- Server Configuration
- Server Density
- Server Failback
- Server Farm
- Server Hosting
- Server Isolation
- Server Load
- Server Mirroring
- Server Rack
- Server Room
- Server-Side
- Service Access Point (SAP)
- Service Assurance
- Service Broadcasting
- Service Chain
- Service Composition
- Service Level Agreement (SLA)
- Service-Level Agreement (SLA)
- Service-Oriented Network
- Service Provider Gateway (SPG)
- Service Set Identifier (SSID)
- Session Border Controller (SBC)
- Session Control
- Session Description Protocol (SDP)
- Shannon Capacity
- Shared Bandwidth
- Shielded Twisted Pair (STP)
- Short Message Service (SMS)
- Shortest Path Bridging (SPB)
- Sidelink
- Signal Attenuation
- Signal Encryption
- Signal Gain
- Signal Latency
- Signal Noise Ratio (SNR)
- Signal Reflection
- Signal Spectrum
- Signal Strength Indicator
- Signal-to-Noise Ratio (SNR)
- Signaling Gateway
- Signaling System No. 7 (SS7)
- Simple API
- Simple Mail Transfer Protocol (SMTP)
- Simple Network Management Protocol (SNMP)
- Simple Object Access Protocol (SOAP)
- Single Channel Per Carrier (SCPC)
- Single Wire Transmission
- SLAAC (Stateless Address Auto-Configuration)
- Slicing Network
- Small Cell Network
- Smart Antenna System
- Smart Grid
- Smart Home
- Smart Network
- Smart NIC
- Smart Switch
- SMTP (Simple Mail Transfer Protocol)
- Social Engineering
- Socket Interface
- Soft Failure
- Soft Hand-off
- Software-Defined Access Network (SDAN)
- Software-Defined Networking (SDN)
- Software-Defined Perimeter (SDP)
- Software-Defined Storage (SDS)
- Software Network Agent
- Softwire Mechanism
- SONET (Synchronous Optical Network)
- Source Routing
- Source-Specific Multicast (SSM)
- Space Division Multiple Access (SDMA)
- Spam
- Spam Filter
- Spanning Tree Protocol (STP)
- Spatial Channel
- Spectral Bandwidth
- Spectroscopic Network
- Spectrum Allocation
- Spectrum Analyzer
- Spectrum Efficiency
- Spectrum Fragmentation
- Spectrum Management
- Spectrum Overlay
- Spectrum Sharing
- Speed Test
- Splicing Connector
- Splitting Ratio
- Spoofing Attack
- Spread Spectrum
- Sprint Network
- Spyware
- Squelch Circuit
- SSID (Service Set Identifier)
- SSL Offloading
- SSL (Secure Sockets Layer)
- Stability Buffer
- Stack Exchange
- Standby Router
- Stateful Firewall
- Stateful Inspection
- Stateful Session
- Stateless Protocol
- Static IP
- Static IP Address
- Static Packet Filtering
- Static Route
- Statistical QoS
- Stay-Alive Timer
- Storage Area Network (SAN)
- Streaming Media Server
- Streaming Video
- Structured Cabling
- Structured Cabling System
- Subnet Mask
- Subscriber Database
- Subscriber Identifier Module (SIM)
- Subscriber Identity Module (SIM)
- Subscriber Line
- Subscriber Loop
- Subscription Broadcasting
- Supervisory Control and Data Acquisition (SCADA)
- Supervisory Network
- Supply Chain Network
- Surety Bonding
- Switch
- Switch Fabric
- Switched Ethernet
- Switched Megabit Data Service (SMDS)
- Switched Multimegabit Data Service (SMDS)
- Switching Fabric
- Symmetrical Broadband
- Synchronous Network
- Synchronous Optical Networking (SONET)
- Synchronous Serial Interface (SSI)
- Synchronous Transfer
- Synthesized Network
- Synthetic Network
- Syslog
- System Bus Interface
- System Network Architecture (SNA)
- System on a Chip (SoC)
t
- T-Carrier System
- T-Connector
- T1 Line
- T3 Line
- Tag Distribution Protocol (TDP)
- TCP/IP Stack
- TCP Spoofing
- TCP (Transmission Control Protocol)
- Telecommunications
- Telemetry Data
- Telepresence
- Temporal Key Integrity Protocol (TKIP)
- Terabit Data Network (TBDN)
- Terrestrial Network
- Test Access Port (TAP)
- Tethering
- Throughput
- Time-Division Duplexing (TDD)
- Time Division Multiplexing (TDM)
- Time-Division Multiplexing (TDM)
- Time to Live (TTL)
- TLS (Transport Layer Security)
- Token Bucket Algorithm
- Token Ring
- Torrent
- Traceroute
- Traffic Engineering Label Switched Path (TE-LSP)
- Traffic Flow
- Traffic Prioritization
- Traffic Shaping
- Transient Noise
- Transmission Band
- Transmission Control Protocol (TCP)
- Transmission Convergence Layer
- Transmission Distance
- Transmission Line
- Transmission Media
- Transmission Power Control (TPC)
- Transport Layer Security (TLS)
- Transport Protocol Port
- TRILL (TRansparent Interconnection of Lots of Links)
- Trivial File Transfer Protocol (TFTP)
- Trojan
- Trunk Groups
- Trunking
- Trunking Protocol
- Trusted Authentication
- Trusted Network Module (TNM)
- Trusted Platform Module (TPM)
- Trusted Third Party
- Tunnel Broker
- Tunneled Direct Link Setup (TDLS)
- Twinaxial Cable
- Twisted Pair Cable
- Two-Factor Authentication (2FA)
- Two-Way Authentication
u
- U-NII (Unlicensed National Information Infrastructure)
- UDP (User Datagram Protocol)
- Ultra-Broadband
- Ultra-High Definition (UHD)
- Ultra High Frequency (UHF)
- Ultra-Low Latency
- Ultra-Wideband (UWB)
- Unbuffered Memory
- Unchannelized Interface
- Underlay Network
- Unidirectional Path Switched Ring (UPSR)
- Unified Communication
- Unified Network Management
- Unified Threat Management (UTM)
- Uniform Resource Identifier (URI)
- Uninterruptible Power Supply (UPS)
- Unique Local Address (ULA)
- Universal Mobile Telecommunications System (UMTS)
- Universal Network Architecture (UNA)
- Universal Personal Telecommunications (UPT)
- Universal Plug and Play (UPnP)
- Universal Serial Bus (USB)
- Universal Service Fund (USF)
- Universal Time Coordinated (UTC)
- Unmanned Aerial Vehicle (UAV)
- Uplink
- Uplink Frame
- Upstream
- Upstream Power Back-off (UPBO)
- Uptime
- URL Filtering
- URL Redirection
- URL (Uniform Resource Locator)
- USB Modem
- Usenet
- User Database
- User Datagram Protocol (UDP)
- User ID
- User Network Interface (UNI)
- User Plane
- User Plane Function (UPF)
- Utility Network
- Uu Interface
v
- Variable Bitrate Control (VBR)
- VDSL (Very High Data Rate Digital Subscriber Line)
- Virtual Cell Network
- Virtual Chamber
- Virtual Channel
- Virtual Circuit
- Virtual Connection
- Virtual Firewall
- Virtual Interface
- Virtual LAN (VLAN)
- Virtual Link
- Virtual Machine (VM)
- Virtual Network
- Virtual Network Function (VNF)
- Virtual Network Interface Card (VNIC)
- Virtual Network Layer
- Virtual Network Operator (VNO)
- Virtual Network Switch
- Virtual Network Topology
- Virtual Path
- Virtual Path Identifier (VPI)
- Virtual Private LAN Service (VPLS)
- Virtual Private Network (VPN)
- Virtual Router
- Virtual Routers on the Move (VRoM)
- Virtual Routing and Forwarding (VRF)
- Virtual Server
- Virtual Subscriber
- Virtual Switch Interface (VSI)
- Virtual Terminal
- Virtual Topology Mapping
- Virtualization
- Virtualization Layer
- Virtualization Platform
- Virtualized Network Function (VNF)
- Virus Signature
- Visible Network
- VLAN (Virtual Local Area Network)
- VLC
- Voice Activity Detection (VAD)
- Voice Frequency Channel (VFC)
- Voice over Broadband (VoBB)
- Voice Over Broadband (VoBB)
- Voice over Internet Protocol (VoIP)
- Voice Over Internet Protocol (VoIP)
- Voice over LTE (VoLTE)
- Voice Recognition
- Voice Traffic
- Voice Traffic Optimization
- VoIP Adapter
- VoIP Gateway
- VoIP Phone
- VoIP (Voice over Internet Protocol)
- Volume Shadow Copy Service (VSS)
- VPN Client
- VPN Concentrator
- VPN Server
- VPN Tunnel
- VPN (Virtual Private Network)
- Vulnerability Assessment
w
- WAN (Wide Area Network)
- Wardriving
- Wavelength Division Multiplexing (WDM)
- Wavelength Plan
- Weather Radar Interference
- Web Application Firewall (WAF)
- Web Cache
- Web Caching Proxy
- Web Communication Gateway
- Web Crawler
- Web Hosting
- Web Hosting Server
- Web Load Balancer
- Web Proxy
- Web Proxy Cache
- Web Security Gateway (WSG)
- Web Server
- Web Server Application
- Web Server Logs
- Web Traffic Analysis
- Web Traffic Management
- Webmail
- Webpage
- Website Caching
- WebSocket Protocol
- Weighted Fair Queuing (WFQ)
- WEP (Wired Equivalent Privacy)
- Wi-Fi
- Wi-Fi 5 (802.11ac)
- Wi-Fi 6 (802.11ax)
- Wi-Fi Access Point
- Wi-Fi Analyzer
- Wi-Fi Certified
- Wi-Fi Hotspot
- Wi-Fi Peer-to-Peer (Wi-Fi P2P)
- Wi-Fi Protocol
- Wi-Fi Repeater
- Wi-Fi Router
- Wi-Fi Security
- Wi-Fi Signal Booster
- Wide Area Augmentation System (WAAS)
- Wide Area Information Servers (WAIS)
- Wide Area Network (WAN)
- Wideband
- WiGig (802.11ad)
- WiMAX (Worldwide Interoperability for Microwave Access)
- Windows Internet Naming Service (WINS)
- Wire Speed
- Wired Network
- Wireless Access Point (WAP)
- Wireless Ad-Hoc Network
- Wireless Application Protocol (WAP)
- Wireless Application Service Provider (WASP)
- Wireless Bridge
- Wireless Communication
- Wireless Distribution Frame (Wi-DF)
- Wireless Distribution Service (WDS)
- Wireless Distribution System (WDS)
- Wireless Ethernet
- Wireless Gateway
- Wireless Gateway Router
- Wireless Information Security
- Wireless Internet Protocol (WIP)
- Wireless Internet Service Provider (WISP)
- Wireless ISP (WISP)
- Wireless Local Area Network (WLAN)
- Wireless Mesh Backhaul
- Wireless Mesh Network
- Wireless Metropolitan Area Network (Wireless MAN)
- Wireless Network Access Point (WNAP)
- Wireless Network Infrastructure
- Wireless Network Interface Card (NIC)
- Wireless Network Scanning
- Wireless Networking
- Wireless Personal Area Network (WPAN)
- Wireless Router Configuration
- Wireless Sensor Network (WSN)
- Wireless Side Channel
- Wireless Signal
- Wireless Spectrum
- Wireless Spectrum Management
- Wireless USB
- Wireless Wide Area Network (WWAN)
- WirelessMAN
- Wireshark Monitoring
- WLAN (Wireless Local Area Network)
- WMAN (Wireless Metropolitan Area Network)
- Workgroup Bridge
- Workgroup LAN (WLAN)
- World Wide Web (WWW)
- WPA (Wi-Fi Protected Access)
- WPA2-Enterprise
- WPA3
- WPS Pin
- WPS (Wi-Fi Protected Setup)
- WRED (Weighted Random Early Detection)
- WSUS
x
- X.25 Protocol
- X.500 Directory
- XaaS (Anything as a Service)
- XDR (Extended Detection and Response)
- xDSL (Various Digital Subscriber Line technologies)
- XML (eXtensible Markup Language)
- XML Firewall
- XML Schema
- XMODS
- XS-PON (10-Gigabit Symmetrical Passive Optical Network)
z
- z/OS
- Z-Wave
- Z-Wave Network
- Zero Configuration Networking
- Zero Configuration Networking (ZeroConf)
- Zero-Day Exploit
- Zero-Day Threat
- Zero-Footprint Network
- Zero-Knowledge Proof
- Zero Latency
- Zero-Perm Memory
- Zero-Touch Configuration
- Zero Touch Provisioning (ZTP)
- Zero-Trust Network Access (ZTNA)
- Zero-Trust Security (ZTS)
- Zettabyte Era
- Zigbee
- Zigbee IP
- Zigbee Protocol
- Zigbee RF4CE
- Zigbee Smart Energy
- Zombie Computer
- Zoned Redundant Storage (ZRS)
- Zoned Storage
- Zoning