 
			Welcome to the Network Glossary, your reference guide for key terms, definitions, and concepts used in networking and IT systems.
If you’re expanding your knowledge, explore our Video Surveillance Glossary and Access Control Glossary for more related terminology.  These resources are designed to help security professionals, integrators, and end users better understand the technologies shaping today’s security solutions.
Network Glossary
A complete A–Z reference of key networking and IT terms for security professionals and integrators.
Network Glossary Terms and Definitions
A
- ACLPacket filtering rules on routers/switches.
- Air-GapPhysical network separation for high security.
- AnycastSame IP advertised from many sites for resilience.
- ARPResolves IP to MAC addresses on a LAN.
C
- Capacity PlanningForecasting compute, storage, and network.
- Certificate/PKIPublic key infrastructure for identity and trust.
- Change ControlProcess managing production changes and rollback.
- Client VPNUser-initiated remote access tunnel.
- Containers (Docker/K8s)Package and orchestrate apps for portability.
- Core/Access SwitchTwo-tier architecture for campus networks.
- CVE/CVSSVulnerability IDs and severity scoring system.
D
- Data at Rest EncryptionEncrypt disks/volumes where video is stored.
- Data ClassificationCategorize data for protection and retention.
- Data in Transit EncryptionEncrypt traffic between cameras, servers and clients.
- DLPPrevent sensitive data exfiltration.
- DNSResolves domain names to IP addresses.
E
- EDR/XDREndpoint/extended detection and response tools.
- EthernetWired LAN technology used by IP cameras and servers.
- Extender (PoE)Device extending Ethernet/PoE beyond 100m.
F
- FirewallControls traffic via rules; stateful inspection.
G
- GeoredundancyReplicate data/services across regions.
- GPU PassthroughAssign GPUs to VMs/containers for analytics.
- Guest/VLAN EdgeIsolated networks for visitors and IoT devices.
H
- Hardening GuidesVendor/industry baselines to reduce attack surface.
- Health ProbesAutomated checks for service uptime.
- High Availability ClusterRedundant servers that fail over on faults.
I
- IDS/IPSIntrusion detection/prevention systems.
- IGMP SnoopingManages multicast streams to prevent flooding.
- Immutable BackupsWrite-once backups protecting from ransomware.
- IPv4/IPv6Internet Protocol versions; addressing and routing.
- iSCSI/NFS/SMBCommon storage protocols for video servers.
K
- Key Management ServiceCentralized encryption key lifecycle control.
L
- LAG/LACPAggregates multiple links for bandwidth/redundancy.
- Latency/JitterDelay and its variation over time.
- LC/SC ConnectorsCommon fiber connector types.
- Least PrivilegeGrant only the minimum necessary permissions.
- Length Limit (100m)Ethernet copper max distance without extenders.
- Load BalancerDistributes traffic across servers/services.
M
- Media ConverterConverts copper to fiber or coax to Ethernet.
- Micro-SegmentationFine-grained policy per workload/device.
- MTU/Jumbo FramesPacket size; larger frames reduce overhead on LANs.
- Multicast/UnicastOne-to-many vs one-to-one streaming modes.
- Multimode/Singlemode FiberShort vs long-distance optical fiber types.
N
- NAT/PATTranslates private to public addresses; ports.
- NetFlow/sFlowFlow telemetry for traffic analysis.
O
- ObservabilityMetrics, logs, traces for understanding systems.
P
- Packet LossDropped packets causing artifacts and stutter.
- PatchingRegular updates to fix vulnerabilities.
- Penetration TestingAuthorized simulated attacks to find weaknesses.
- PoE (802.3af)Delivers up to ~15.4W per port; common for cameras.
- PoE bt/UPoE (802.3bt)Up to 60-90W; multi-sensor/thermal/PTZ.
- PoE+ (802.3at)Up to ~30W; powers PTZs/heaters.
Q
- QoS (DSCP)Traffic prioritization for latency‑sensitive streams.
R
- RADIUS/TACACS+Centralized authentication for admins/network access.
- RAID 5/6/10Redundant disk arrays used in NVR/VMS servers.
- Ransomware ProtectionBackup isolation, least privilege, EDR.
- Red/Blue/Purple TeamAttack/defense/collaborative testing functions.
- Routing Protocols (OSPF/BGP)Dynamic routing for medium/large networks.
- RTSP over TCP/UDPTransport choice for reliability vs latency.
- Runbook/PlaybookStep-by-step response or maintenance procedures.
S
- SD-WANPolicy-based WAN overlay using multiple links.
- Secrets ManagementSecure storage/rotation of keys/passwords.
- Service AccountsNon-human accounts with scoped permissions.
- SFP/SFP+Fiber/copper transceivers for 1/10 Gbps links.
- SIEMSecurity information/event management platform.
- Site-to-Site VPNPermanent tunnel between locations.
- SLA/SLO/SLIService metrics and objectives for uptime/performance.
- SNMPv3Encrypted/authorized monitoring of devices.
- SSHEncrypted remote shell for device administration.
- Static/DHCPManual vs automatic IP addressing.
- Storage (NAS/SAN)Network-attached vs storage-area networks.
- STP/RSTP/MSTPLoop prevention protocols in Ethernet switching.
- Subnet/GatewayDefines local network and route to other networks.
- Switch (Managed)Provides VLANs, QoS, PoE budgets, port security.
- SysHealth APIProgrammatic health/metrics export from platforms.
- SyslogCentralized logging protocol for network devices/servers.
T
- Throughput/GoodputRaw vs useful data transfer rates.
- TLS/SSLEncryption for HTTPS and secure services.
- Trunk/Access PortTrunk carries multiple VLANs; access carries one.
U
- UTP/STP CablingUnshielded vs Shielded twisted pair; Cat5e/6/6A/7.
V
- Virtualization (VMware/Hyper-V)Run multiple VMs per host for consolidation.
- VLANLogical LAN segmentation for isolation and broadcast control.
- VPN (IPsec/SSL)Encrypted tunnels for remote access/site-to-site.
- Vulnerability ScanningContinuous checks for CVEs and misconfigurations.
W
- Write EnduranceSSD metric for total bytes written (TBW/DWPD).
Z
- Zero TrustModel assuming no implicit trust; verify each request.
#
- 802.1XPort-based network access control using EAP.
This Network Glossary is part of our ongoing effort to provide educational resources for the security industry. For deeper insights, check out our related blog posts such as Networking Basics for Security Systems or Cybersecurity Best Practices. If you have questions or want to explore product options, contact our team for expert support.

