Skip to content

Network and Systems Administration Glossary

25 essential terms — because precise language is the foundation of clear thinking in Network and Systems Administration.

Showing 25 of 25 terms

A Microsoft directory service for Windows domain networks that provides centralized identity management, authentication via Kerberos, and Group Policy enforcement.

Related:LDAPKerberosGroup Policy

An open-source automation tool that uses agentless architecture and YAML playbooks to manage configuration, deployment, and orchestration across servers.

Related:Infrastructure as CodeConfiguration ManagementSSH

The inter-domain routing protocol that exchanges routing information between autonomous systems on the internet, enabling global connectivity.

Related:Autonomous SystemRoutingISP

A method for allocating IP addresses and routing that replaces the older classful addressing system, using variable-length subnet masks denoted with slash notation (e.g., /24).

Related:Subnet MaskIP AddressRouting

A lightweight, portable, self-sufficient unit that packages an application with all its dependencies, sharing the host operating system kernel for efficient resource usage.

Related:DockerKubernetesVirtualization

Dynamic Host Configuration Protocol, a network protocol that automatically assigns IP addresses and other configuration parameters to devices joining a network.

Related:IP AddressNetwork ConfigurationLease

A perimeter network segment that sits between an internal trusted network and an external untrusted network, hosting public-facing services like web and mail servers.

Related:FirewallBastion HostNetwork Security

Domain Name System, a hierarchical distributed naming system that translates human-readable domain names into IP addresses used for network communication.

Related:A RecordName ServerZone File

The automatic switching of operations from a failed system or component to a standby redundant system, ensuring continued service availability with minimal interruption.

Related:High AvailabilityClusteringRedundancy

A network security system that monitors and controls incoming and outgoing traffic based on predetermined rules, serving as a barrier between trusted and untrusted networks.

Related:ACLStateful InspectionDMZ

A feature of Windows Active Directory that allows administrators to define and enforce security settings, software installation, and user configurations across all domain-joined computers.

Related:Active DirectoryGPOWindows Server

Software that creates and manages virtual machines by abstracting physical hardware resources. Type 1 runs on bare metal; Type 2 runs on a host operating system.

Related:VirtualizationVirtual MachineESXi

The practice of defining and managing computing infrastructure through machine-readable configuration files, enabling version control, automation, and repeatable deployments.

Related:TerraformAnsibleCloudFormation

Lightweight Directory Access Protocol, an open standard for accessing and maintaining distributed directory information services over a TCP/IP network.

Related:Active DirectoryAuthenticationDirectory Service

A device or software that distributes incoming network traffic across multiple servers to ensure reliability, availability, and optimal performance of applications.

Related:High AvailabilityReverse ProxyRound Robin

A method of remapping private IP addresses to a public address for internet communication, conserving IPv4 address space and masking internal network structure.

Related:IPv4PATPrivate IP Address

A protocol for synchronizing clocks of computer systems over packet-switched networks, critical for log correlation, authentication protocols, and scheduled tasks.

Related:Time SynchronizationStratumLogging

The seven-layer Open Systems Interconnection reference model that standardizes communication functions: Physical, Data Link, Network, Transport, Session, Presentation, and Application.

Related:TCP/IP ModelProtocol StackEncapsulation

Redundant Array of Independent Disks, a technology combining multiple physical drives into a logical unit for improved performance, redundancy, or both.

Related:StripingMirroringParity

Simple Network Management Protocol, used to collect information from and configure network devices, enabling centralized monitoring and management of infrastructure.

Related:MIBOIDNetwork Monitoring

Secure Shell, a cryptographic protocol for secure remote access, file transfer, and tunneling over unsecured networks, replacing insecure protocols like Telnet.

Related:Public KeyPort 22SCP

A logically defined subdivision of an IP network, created by applying a subnet mask to partition a larger network into smaller, more manageable segments.

Related:CIDRSubnet MaskNetwork Segmentation

Transmission Control Protocol, a connection-oriented transport layer protocol that provides reliable, ordered, and error-checked delivery of data between applications.

Related:UDPThree-Way HandshakePort

Virtual Local Area Network, a logical grouping of devices on different physical LAN segments into a single broadcast domain, improving security and reducing broadcast traffic.

Related:802.1QTrunkingSwitch

Virtual Private Network, a technology that creates an encrypted tunnel over a public network to securely extend a private network, enabling remote access and site-to-site connectivity.

Related:IPSecWireGuardEncryption
Network and Systems Administration Glossary - Key Terms & Definitions | PiqCue