+91 9108423861 info@vaysinfotech.com

3G

Actually stands for “third generation”, as it is the third type of access technology that has been made widely commercially available for connecting mobile phones.

Adware

Adware, or advertising-supported software, is software that generates revenue for its developer by automatically generating online advertisements in the user interface of the software or on a screen presented to the user during the installation process.

ACP

An Asynchronous Procedure Call (APC) is a function that executes asynchronously in the context of a particular thread. When an APC is queued to a thread, the system issues a software interrupt. The next time the thread is scheduled, it will run the APC function.

ARP

Address Resolution Protocol (ARP) converts an IP address into a physical address(Ethernet address). It is a communication protocol used for discovering the link-layer address, such as a MAC address associated with a given internet layer address, typically an Ipv4 address.

Anti-Virus & Anti-Spyware

Gateway Anti-Virus and Anti-Spyware solution offers web, email and Instant messaging security against, malware, including viruses, worms, spyware, backdoor, Trojans and Key loggers.

Anti-Spam

Anti-spam refer to services and solution that focus on blocking mitigating the effect of illegal emails or spam on email users.

AES

(Acronym of Advanced Encryption Standard) is a symmetric algorithm. AES was designed to be efficient in both hardware and software and supports a block length of 128, 192, and 256 bits.

AMSDU

Aggregate MAC Service Data Unit- a method to perform frame aggregation

AMPDU

Aggregate MAC Protocol Data Unit- a method to perform frame aggregation

Broadcast Domain

A broadcast domain is a logical division of a computer network, in which all nodes can reach each other by broadcast at the data link layer. A broadcast domain can be within the same LAN segment or it can be bridged to other LAN segments.

Bandwidth Management

Is the process of and measuring and controlling communications traffic, packets on a network link to avoid filling the link capacity or overfilling link, which would result in network congestion and poor performance of the network.

Beam Flex Technology

An adaptive antenna technology of Ruckus

Beam Flex 

Improvement to Beam Flex technology by Ruckus

Beam Forming

An Antenna Technology to increase Radiation in one particular direction where the Clients are located

BSSID

Basic Service Set Identifier- An identification for the access point

CASB

Cloud Access Security Broker is a tool that allows an organization to extend their security policies beyond their infrastructure and protects sensitive data wherever it goes inside the cloud or outside the cloud. To control security threats and to correct policy violations within cloud services.

Cisco IOS

Cisco Internetwork Operating System is a family of network operating systems used on many Cisco Systems routers and current Cisco network switches. IOS is a package of routing, switching, internetworking and telecommunications functions integrated into a multitasking operating system.

Cisco IOS CLI

The Cisco IOS Command Line Interface is used for maintaining, configuring & monitoring Cisco devices. This primary user interface allows you to directly and simply execute Cisco Internetwork Operating System commands, whether using remote access methods or a router console or terminal.
For more information on Cisco IOS CLI please click below link https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/configuration/15mt/fundamentals-15-mt-book/cf-cli-basics.html

Cloud-native architecture

It is an architecture or system that has been built specifically to run in the cloud. Cloud-native architectures have the benefit of more flexibility over legacy systems that were built to run on particular hardware infrastructure and may be difficult to migrate to the cloud later.

Dual Band

Supporting transmission in either on 2.4 GHz or 5 GHz.

DDoS

Distributed Denial-of-Service attack is an attack in which multiple compromised computer systems attack a target, such as a server, website or other network resources, and cause a denial of service for users of the targeted resource. The flood of incoming messages, connection requests or malformed packets to the target system forces it to slow down or even crash and shut down, thereby denying service to legitimate users or systems. The DoS attack typically uses one computer and one Internet connection to flood a targeted system or resource.

DLP

Data Loss Prevention is also known as Data Leak Prevention / Information Leak Prevention. Data Loss   Prevention (DLP) makes it possible to monitor and restrict the transmission of files containing data which are sensitive and also ensuring that end clients don’t send confidential data outside the corporate network. Data exfiltration is also called as data theft or data extrusion. Copying, Transferring or retrieving data from a computer or server by not having official permission or approval.

DHCP

Dynamic Host Configuration Protocol (DHCP) is a network server that provides automatic IP addresses and assigns IP addresses.

DevOps

It is a set of practices that combines software development (Dev) and information technology operations (Ops) which aims to shorten the systems development life cycle and provide continuous delivery with high software quality.

DTLS

Datagram Transport Layer Security is based on the Transport Layer Security (TLS) protocol, DTLS rely on UDP (User Datagram Protocol) and TLS rely on TCP (Transmission Control Protocol).
It is used in VoIP, instant messaging and mail. DTSL is one of the security protocols used for WebRTC.

Dual Radio

Two radios in an access point- one operating at 2.4 GHz and the other at 5 GHz

DMZ

(Demilitarized zone) is a physical or logical sub-network that separates an internal local area network (LAN) from other untrusted networks, usually the Internet.

EAP-TLS

PEAP Transport Layer Security, defined in RFC 5216, is an IETF open standard that uses the Transport Layer Security (TLS) protocol, and is well-supported among wireless vendors. EAP-TLS is the original, standard wireless LAN EAP authentication protocol.

FCoE

Fibre Channel over Ethernet solves the problem of organizations having to run parallel network infrastructures for their local area networks (LANs) and their storage area networks (SANs). As a result, they have to operate separate switches, host bus adapters (HBAs), network interface cards (NICs) and cables for each of these networks. Even utilizing a virtualization solution like VMware can actually increase the number of network adapters required to carry traffic out of the servers.

FLB Adapter

System Board with an embedded NIC is referred as LAN-on-motherboard (LOM) architecture.
FlexibleLOM uses a system board edge connector that accepts a FlexibleLOM adapter, which integrates seamlessly.
The FlexibleLOM Blade (FLB) adapter installs as a daughter card on the server blade board, just like a mezzanine card. FLB uses PCI Express v2.0 (Gen 2) x8 interface (as of 1-2-2020)

GUI

Graphical User Interface is a form of user interface that allows users to interact with electronic devices through graphical icons and an audio indicator such as primary notation, instead of text-based user interfaces, typed command labels or text navigation.

GENEVE

Generic Network Virtualization Encapsulation(GENEVE) is an emerging overlay technology that resembles VXLAN and GRE, in that packets between hosts are designed to be transmitted using standard networking equipment without having to modify the client or host applications. Like VXLAN, GENEVE encapsulates packets with a unique header and uses UDP as its transport mechanism.

GRE

Generic Routing Encapsulation (GRE) is a tunnelling protocol developed by Cisco that allows the encapsulation of a wide variety of network layer protocols inside point-to-point links. A GRE tunnel is used when packets need to be sent from one network to another over the Internet or an insecure network.

Hybrid VPN

It is the combination of IPsec VPN and MPLS (MultiProtocol Label Switching) VPN and to provide strong encryption IPsec works as a backup of MPLS
If the user uses a hybrid VPN he will get a maximum protection over a public internet connection and also he can connect the central site to a remote location.

IPS

An Intrusion Prevention System (IPS) is a network security/threat prevention technology that examines network traffic flows to detect and prevent vulnerability exploits.

Ipsec

Internet Protocol Security a layer 3 security protocol
It is used for securing internet communication across an IP network.
It provides the utmost encryption from beginning to end of the connection. It works in 2 modes:
1)Transport mode
2)Tunneling mode
Only the message in the traffic is encrypted in the data packet in transport mode whereas the whole data packet is encrypted in the tunneling mode.

IB

InfiniBand is a computer-networking communications standard used in high-performance computing that features very high throughput and very low latency. It is used for data interconnect both among and within computers. InfiniBand is also used as either a direct or switched interconnect between servers and storage systems, as well as an interconnect between storage systems.

iSCSI

Internet Small Computer System Interface is a transport layer protocol that describes how Small Computer System Interface(SCSI) packets should be transported over a TCP/IP network.

ICAP

Internet Content Adaption Protocol is a protocol aimed at providing simple object-based content vectoring for HTTP services.

IoT

Internet of Things- Technology connecting any device to Internet

Kernel

The Kernel is a computer program that is the core of a computer’s operating system, with complete control over everything in the system.

L2TP

Layer 2 Tunnelling Protocol is an extension of PPTP. It is not a single VPN, so it works together with another VPN.
Your data will travel through a tunnel between two L2TP connection points and if the IPsec VPN works it will encrypt the data
Layer 2 Tunnelling Protocol does not encrypt data if it works separately.

MIMO

Multiple Input Multiple Output- an antenna technology

Multiple Link Management

Cyberoam’s multiple link management supports WAN redundancy and delivers assured WAN availability and reliable connectivity.

MRP

Media Redundancy Protocol is an open standard for ring topologies standardized by IEC 62439-2 (International Electrotechnical Commission). It enables recovery time much faster than achievable with STP (Spanning Tree Protocol) and each Ethernet switch is connected to two other switches forming a ring.

MRP CLI Mode

MRP (Media Redundancy Protocol) Command-Line Interface mode—this mode is managed by the Cisco IOS CLI and Web Device Manager, a web-based user interface (UI).
For more information on MRP CLI Mode please click below link https://www.cisco.com/c/en/us/td/docs/switches/connectedgrid/cg-switch-sw-master/software/configuration/guide/mrp/b_mrp_ie.html

MRM

Media Redundancy Manager defines its maximum recovery times for a ring in the following range: 10 ms, 30 ms, 200 ms and 500 ms.
For more information on MRM please click below link https://www.cisco.com/c/en/us/td/docs/switches/connectedgrid/cg-switch-sw-master/software/configuration/guide/mrp/b_mrp_ie.html

MRA

Media Redundancy Automanager have the authority to both monitor and react to changes in the ring, Managers represent a single point of control and failure: if the Manager goes down, the ring falls apart and that’s where the Automanager comes in. When it’s powered on, an Automanager transmits test frames just like a normal Manager.  But it also listens for test frames that may be transmitted from other Automanagers in the ring.
For more information on MRA please click below link https://profinetuniversity.com/system-redundancy/understanding-the-mrp-automanager/

MPLS

Multiprotocol Label Switching is usually used for Site-to-Site connection. An Internet Service Provider (ISP) uses this kind of VPN & connects several sites to form a VPN. This increases the speed distribution of data packets.

MACsec

Media Access Control Security is a layer 2 protocol where data packets are encoded and decoded into actual bits and it is an IEEE (Institute of Electrical & Electronics Engineers) standardized for security in wired Ethernet LANs to provide secure communication for all traffic within a Local Area Network (LAN).

Mezzanine card

A printed circuit board that plugs directly into another plug-in card. For example, a mezzanine card, also known as a “daughterboard,” might plug into different cards like CompactPCI card or PCI card or a VMEbus in order to extend its functionality. Adapter cards are also available that enable a mezzanine card to plug into the larger slot of the target bus.
Smaller than standard expansion cards, mezzanine cards are typically designed for rugged industrial use and are often bolted down after being plugged in. IndustryPack, PMC, PC*MIP and PC/104+ are commonly used mezzanine cards.

NTLM

In a Windows network, New Technology LAN Manager is a suite of Microsoft security protocols intended to provide authentication, integrity, and confidentiality to users.

NIC

A Network Interface Card is a hardware component without which a computer cannot be connected over a network. It is a circuit board installed in a computer that provides a dedicated network connection to the computer. It is also called a network interface controller, network adapter or LAN adapter.

NVGRE

Network Virtualization using Generic Routing Encapsulation is a network virtualization method that uses encapsulation and tunneling to create large numbers of virtual LANs (VLANs) for subnets that can extend across dispersed data centres and layer 2 (the data link layer) and layer 3 (the network layer).

OpenVPN

OpenVPN is an open-source VPN. It is typically used for creating Point-to-Point and Site-to-Site connections. It uses a traditional security protocol/ custom security protocol based on SSL and TLS protocol.

Outbound Spam Protection

Cyberoam outbound spam protection solution protects service provider from recurring incidents of outbound spam in the network

OCR

Optical Character Recognition or Optical Character Reader converts the printed text or handwritten text into documents that can be edited when required & the text should be clear and at times, handwritten text may not be recognized by the software.

PPoE

Point to Point Protocol over Ethernet

Profinet

Profinet is an open Industrial Ethernet Standard, useful for process control networks and industrial automation systems, designed for collecting data from, and controlling equipment in industrial systems. It uses Transmission Control Protocol (TCP) or Internet Protocol (IP) and Information Technology (IT) standards for automation control.

Profinet GSD File

A Profinet General Station Description file is a detail explanation of an Input/Output (I/O) device provided by the device manufacturer & the contents of the GSD consists of modules, configuration information, diagnostic & alarms, parameters, vendor and device ID.
For more information on Profinet GSD File please click below link
https://profinetuniversity.com/profinet-basics/profinet-gsd-file-basics/

PPP

Point-to-Point Protocol is a layered protocol and is used on a very basic level of connectivity to provide data links between two directly connected computers or a computer and a printer.
To continue data across a network Point-to-Point protocol takes data from one protocol and translates it to another protocol.

PPTP

Point-to-Point Tunelling Protocol creates a passage to pass your internet traffic safely and for a secure connection.
PPTP is one of the most generally utilized VPN protocol and has been being used since the early arrival of Windows. PPTP is also used on Mac and Linux
PPTP does not provide any encryption facility and also it depends on PPP (Point-to-Point Protocol) to provide security features to its users.

PEAP

Protected Extensible Authentication Protocol is a version of EAP, the authentication protocol used in wireless networks and Point-to-Point connections. PEAP is designed to provide more secure authentication for 802.11 WLANs (wireless local area networks) that support 802.1X port access control.

PCI

Peripheral Component Interconnect is a local computer bus for attaching hardware devices in a computer.

PXE

The Preboot Execution Environment is an industry-standard client/server interface that allows networked computers that are not yet loaded with an operating system to be configured and booted remotely by an administrator.

PCIe

Peripheral Component Interconnect Express is an interface standard for connecting high-speed components. Every desktop PC motherboard has a number of PCIe slots you can use to add GPUs (aka video cards aka graphics cards), RAID cards, Wi-Fi cards or SSD (solid-state drive) add-on cards.

RDMA

Remote Direct Memory Access is a technology that allows computers in a network to exchange data in main memory without involving the processor, cache or operating system of either computer. RDMA improves throughput and performance because it frees up resources. RDMA also facilitates a faster data transfer rate and low-latency networking. It can be implemented for networking and storage applications.

Ring Topology

All devices are connected in a ring structure and every device has two neighbouring devices for communication purpose. As its formation is like a ring it is called ring topology, here every computer is connected to another computer and uses token to pass the information from one computer to another.

RoCE

RDMA over Converged Ethernet is a network protocol that allows remote direct memory access (RDMA) over an Ethernet network. It does this by encapsulating an IB transport packet over Ethernet. There are two RoCE versions, RoCE v1 and RoCE v2. RoCE v1 is an Ethernet link layer protocol and hence allows communication between any two hosts in the same Ethernet broadcast domain. RoCE v2 is an internet layer protocol which means that RoCE v2 packets can be routed.

RADIUS

Remote Authentication Dial-In User Service is a networking protocol, an authentication, authorization and accounting system used by many Internet Service Providers (ISPs).

SINR

Signal to Noise Interference Ratio- a measure of quality of wireless connections

SR-IOV

In virtualization, Single Root Input/Output Virtualization is a specification that allows the isolation of the PCI Express resources for manageability and performance reasons. A single physical PCI Express can be shared on a virtual environment using the SR-IOV specification.

SSL & TLS

Secure Sockets Layer & Transport Layer Security is a layer 5 security protocol.
It is suitable for shopping websites/ E-commerce sites or website service providers
Secure Socket Layer (SSL) and Transport Layer Security (TLS) are combined to form a VPN Protocol.
A VPN connection is generated by SSL and TLS where the web portal/browser acts as the client and user access is restricted for a certain application and not the entire network

SMTP

Simple Mail Transfer Protocol is a communication protocol for electronic mail transmission.

Sandbox

Sandbox is an isolated testing environment that enables users to run programs or execute files without affecting the application, system or platform on which they run. Sandboxes are also used to safely execute malicious code to avoid harming the device on which the code is running, the network or other connected devices. Using a sandbox to detect malware offers an additional layer of protection against security threats, such as stealthy attacks and exploits.

STP

The Spanning Tree Protocol is a Data Link Layer (Layer 2 protocol) used to prevent looping within a network topology for ethernet networks. It was created to avoid loops in the network.

Siemens TIA

Siemens Totally Integrated Automation Portal provides digitalized automation services, from integrated engineering and digital planning to transparent operation with unrestricted access and this TIA portal is a perfect gateway to automation in the Digital Enterprise.
For more information on Siemens TIA please click below link https://new.siemens.com/global/en/products/automation/industry-software/automation-software/tia-portal.html

SDN

Software Defined Networking is an approach to network management that enables dynamic, programmatically efficient network configuration in order to improve network performance and monitoring making it more like cloud computing than traditional network management.

SD-WAN

Software Defined WAN simplifies the management and operation of a WAN by decoupling (separating) the networking hardware from its control mechanism.

SSH

Secure Shell generates the VPN tunnel through which the information transfer happens and additionally guarantees that the tunnel is encrypted. Ssh connections are generated with the aid of a SSH client and information is transferred from a local port on to the remote server via the encrypted tunnel.

SIEM Integration

Security Information and Event Management is an approach to security management that combines SIM (Security Information Management) and SEM (Security Event Management) functions into one security management system.

Svchost.exe

Svchost.exe” (Generic Host Process for Win32 Services) is an integral part of Windows OS. It cannot be stopped or restarted manually. This process manages system services that run from dynamic-link libraries (files with extension . Dll) .

TCP

Transmission Control Protocol is a standard that defines how to establish and maintain a network conversation through which application programs can exchange data.

TSO

TCP Segmentation Offload is used to reduce the CPU overhead of TCP/IP on fast networks. TSO breaks down large groups of data sent over a network into smaller segments that pass through all the network elements between the source and destination. TSO is also called Large Segment Offload (LSO).

Triple Sensor Technology

3 sensors integrated to optimize security and performance of networks

Transactional NTFS

Transactional NTFS (abbreviated TxF) is a component introduced in Windows Vista and present in later versions of the Microsoft Windows operating system that brings the concept of atomic transactions to the NTFS file system, allowing Windows application developers to write file-output routines that are guaranteed to either succeed completely or to fail completely.

UEFI

The Unified Extensible Firmware Interface is a specification that defines a software interface between an operating system and platform firmware.

VPN

A Virtual Private Network (VPN) is private network is built over a public infrastructure, Security mechanisms such as encryption, allow VPN users to securely access a network from different location over the public network

VBScript

VBScript is an Active Scripting language developed by Microsoft that is modelled on Visual Basic.

VMQ

The Virtual Machine Queue is a hardware virtualization technology for the efficient transfer of network traffic(such as TCP/IP, iSCSI or FCoE) to a virtualized host OS.

VXLAN

Virtual Extensible LAN (VXLAN) is a proposed encapsulation protocol for running an overlay network on existing layer 3 infrastructure. An overlay network is a virtual network that is built on top of existing network Layer 2 and Layer 3 technologies to support elastic compute architectures.

Virtualization

Refers to the act of creating a virtual (rather than actual) version of something, including virtual computer hardware platforms, operating systems, storage devices and computer network resources.

Wave 2

802.11ac standard supporting MIMO and wider channels up to 160 MHz wide.

WOL

Wake On LAN is a technology that allows a network professional to remotely power on a computer or to wake it up from sleep mode. By remotely triggering the computer to wake up and perform scheduled maintenance tasks, the technician does not have to physically visit each computer on the network.

WAF

Web Application Firewall subscription on its network security appliances (NFW) to secure websites and Web-based applications in organizations against an attack such as SQL injection, cross-site scripting (XSS), URL parameter tampering, session hijacking, buffer overflows and application vulnerabilities.

WiMAX

Technology is a broadband data communications technology-based around 802.16 standard hip speed data, Voice over a wide area network

ZTD – License Portability. Zero Touch Deployment is an ease-of-use feature that automatically registers (enrolls) and distributes X.509 certificates and provisioning information over secure connections within a connected grid network.

Contact Now