Skip to content
NEWS
  • Resources
    • All Resources
    • Case Studies
    • Data Sheets
    • Executive Briefs
    • On-Demand Webinars
    • Solution Briefs
    • Tech Briefs
    • Training
    • Whitepapers
  • Support
    • Product Support
    • Product Activation FAQ
    • Activation Reset Request
    • Maintenance Programs
    • EOS/EOL Policy
    • Contact Tech Support
    • Support Forums
    • MyPeek Portal
    • Training
  • Partners
  • Login
    • MyPeek
    • Partner Portal
  • Free Trial

How to prepare for GDPR breach reporting using packet-based NPMD tools

The language of Article 33 states that companies must inform the authorities “without undue delay and, where feasible, not later than 72 hours after becoming aware of it.”

SEE MORE

How early detection can mitigate common network problems

Using technology tools can help IT staff identify five common issues that typically affect most hospital networks.

SEE MORE

Is Machine Learning the Answer to Network Latency?

Is Machine Learning the Answer to Network Latency? Not yet.

SEE MORE

Using Packet-Based NPM Analytics to Complement NetFlow

NPM experts may view NetFlow and packet-based analytics as competing approaches to the same problem, but the reality is that both have merits that complement each other to accelerate network investigations.

View OnDemand Webinar
Savvius Logo

Savvius

  • Solutions
    • Visibility
    • Network Forensics
    • Wireless
    • Security Investigations
  • Products
    • Omnipeek
    • Omnipliance
    • Spotlight Appliance
    • Omnipliance Ultra
    • Insight
    • Vigil
    • All Products
    • Find a Reseller
  • Company
    • About Savvius
    • Management
    • Careers
    • News
    • Events
    • Contact
    • Customers
  • Buy
    • How to Buy
    • Find a Reseller
    • Solutions
      • Visibility
      • Network Forensics
      • Wireless
      • Security Investigations
    • Products
      • Omnipeek
      • Omnipliance
      • Spotlight Appliance
      • Omnipliance Ultra
      • Insight
      • Vigil
      • All Products
      • Find a Reseller
    • Company
      • About Savvius
      • Management
      • Careers
      • News
      • Events
      • Contact
      • Customers
    • Buy
      • How to Buy
      • Find a Reseller
    • Resources
      • All Resources
      • Case Studies
      • Data Sheets
      • Executive Briefs
      • On-Demand Webinars
      • Solution Briefs
      • Tech Briefs
      • Training
      • Whitepapers
    • Support
      • Product Support
      • Product Activation FAQ
      • Activation Reset Request
      • Maintenance Programs
      • EOS/EOL Policy
      • Contact Tech Support
      • Support Forums
      • MyPeek Portal
      • Training
    • Partners
    • Login
      • MyPeek
      • Partner Portal
    • Free Trial
    • NEWS

      How to prepare for GDPR breach reporting using packet-based NPMD tools

      The language of Article 33 states that companies must inform the authorities “without undue delay and, where feasible, not later than 72 hours after becoming aware of it.”

      SEE MORE

      How early detection can mitigate common network problems

      Using technology tools can help IT staff identify five common issues that typically affect most hospital networks.

      SEE MORE

      Is Machine Learning the Answer to Network Latency?

      Is Machine Learning the Answer to Network Latency? Not yet.

      SEE MORE

      Using Packet-Based NPM Analytics to Complement NetFlow

      NPM experts may view NetFlow and packet-based analytics as competing approaches to the same problem, but the reality is that both have merits that complement each other to accelerate network investigations.

      View OnDemand Webinar
  • Home
  • Resources
  • Networking Glossary

Networking Glossary

Networking Glossary

  • Connection Architectures

    Client/Server, Host/Terminal, etc.

  • Ethernet – IEEE 802.3
    • Frame Formats
      • Frame Format IEEE 802.3
      • Snap Ethernet IEEE 802.3

        SNAP Frame Format

      • Version II
      • Novell Proprietary (“802.3 Raw”)
    • Media Access
    • Collisions
      • Collisions Fig. 1
      • Collisions Fig. 2
      • Collisions Fig. 3
      • Collisions Fig. 4
      • Collisions Fig. 5
      • Collisions Fig. 6
      • Late Collisions Fig. 1
      • Late Collisions – Fig. 2
      • Late Collisions – Fig. 3
      • Late Collisions – Fig. 4
      • Late Collisions – Fig. 5
    • Propagation Delay
    • Frame Corruption
    • Interframe Gap
    • Signal Encoding
      • Perspective
    • Packets and Protocols
    • Addresses and Names
  • Fast Ethernet
    • Introduction To Fast Ethernet
    • Differences Between 100 Mb/ sec and 10 Mb/ sec Ethernet
    • Integration Of 100 Mb/ sec Ethernet Into Existing 10 Mb/ sec networks
    • Migration from 10 Mb/ sec to 100 Mb/ sec Ethernet
    • Data Encoding
      • Layers Topic
    • Troubleshooting
    • Signal Encoding
      • 4B/5B And 8B/6T Code Representations
      • MLT-3 MultiLevel Transition
      • NRZI Non-Return to Zero, Inverted
      • T4 Multiplexing
  • FDDI – Fiber Distributed Data Interface
    • Introduction
    • Operation of the FDDI Ring
    • Protocol Analysis Techniques for FDDI
    • The FDDI Physical Medium Dependent (PMD) Layer
    • Measuring Decibels
  • Fiber Optics – A General Discussion
  • Gigabit Ethernet and Fibre Channel Technology
  • Interconnect Devices: Repeater, Bridge, Switch, Router
    • Bridge Technology
      • Transparent Bridges
      • Learning Bridges
      • Spanning Tree Algorithm
      • Bridge Loops
    • Switch Technology
  • LLC – IEEE 802.2 Logical Link Control
    • Introduction
    • Defining “Connection-less” and “Connection-Oriented”
    • Type I LLC
    • Setting Up a Type II LLC Connection
    • Transmitting and Acknowledging Data in Type II LLC
    • Protocol Analysis Techniques for Type II LLC
    • The Bits in the LLC Header
    • Type I LLC Commands and Responses
    • Type II LLC Commands and Responses
    • Viewing LLC with your Protocol Analyzer
    • The Rationale for Using a Reliable Data Link
  • Networking Technical Reference
    • Ethertype Values
    • Service Access Point (SAP) Identifiers
    • Assigned Port Numbers for TCP and UDP (RFC 1700)
    • Humorous RFCs
    • Courseware Design & Development
  • The TCP/IP Protocol Family
    • Internet Protocol (IP)
      • IP Addressing
      • IP Routing Functions
      • Subnet Masking
      • Address Classes
      • Creating Subnets
      • Special Address Masks
      • Reserved Address List
      • VLSM – Variable Length Subnet Masking
      • Troubleshooting TCP/IP Networks
      • IP Routing Tables
      • Physical Addresses
      • IP Type Of Service
      • IP Fragmentation
    • Internet Control Message Protocol (ICMP)
      • Destination Unreachable
      • Redirect
    • Address Resolution Protocol (ARP)
  • VoIP
  • WAN
  • Wireless LAN / 802.11 WLAN
    • Signal Characteristics
    • Packets and Protocols
    • Addresses and Names
    • Packet Types
  • Glossary of Network Terms
  • Network Terms to Know
  • Savvius Logo
    • Solutions
      • Visibility
      • Network Forensics
      • Wireless
      • Security Investigations
    • Products
      • Omnipeek
      • Omnipliance
      • Omnipliance Ultra
      • Spotlight Appliance
      • Insight
      • Vigil
      • All Products
    • Company
      • About Savvius
      • Management
      • Careers
      • News
      • Events
      • Contact
      • Customers
    • Buy
      • How to Buy
      • Find a reseller
    • Resources
    • Support
    • Become a Partner
    • MyPeek Login
    • Partner Portal
    • Networking Glossary
    © Savvius, Inc. All Registered and unregisted trademarks are the sole property of their respective owners.
    Privacy | Accessibility