Quickly learn the definitions and functions of key networking technologies, and how Netscout incorporates these technologies into products and solutions. These pages can help you understand benefits, what you can do with the technology, and how it works, with links to additional resources.

For education and training specific to Netscout products and solutions, please visit our Support and Services page.

In-depth guides and blogs written by talented network and security experts.

Learn About Cybersecurity

Cybersecurity fundamentals and modern techniques for safeguarding and defending electronic data from cyberattacks.

Learn About Network Monitoring

Key information on getting full network visibility to finally see and understand your entire network

Learn About DDoS Attacks

In a distributed denial-of-service (DDoS) attack, a network of computers work in tandem to overflow an access point and prevent legitimate users from accessing a service.

Learn About Mobile Network Monitoring and 5G

Understanding mobile network technologies to monitor and manage your entire network.

A-B

What is 3G?

3G (Third Generation GSM) is often another name for UMTS (Universal Mobile Telecommunications System), a third generation mobile communications system. The 3GSM name emphasizes the combination of the 3G nature of the technology and the GSM standard that it is designed to succeed.

What is 4G?

4G (Fourth Generation) is the fourth generation of mobile telecommunications technology. 4G adds mobile ultra- broadband internet access to mobile devices in addition to the usual voice and other data services provided by the earlier third generation (3G) technology. Two formats considered as 4G technologies are Mobile WiMAX and LTE.

What is 6G?

6G is the sixth generation of wireless technology, will start where the 5G specifications end. A new generation happens about every 10 years, and 6g technology is expected to be available 2030. 6G is predicted to operate in higher frequencies–the terahertz (THz) spectrum–with lower latency than 5G. Because transmitting in the THz frequencies is...

6G is the sixth generation of wireless technology, will start where the 5G specifications end. A new generation happens about every 10 years, and 6g technology is expected to be available 2030. 6G is predicted to operate in higher frequencies–the terahertz (THz) spectrum–with lower latency than 5G. Because transmitting in the THz frequencies is best for short ranges only, cellular networks might become mesh networks using multiple base stations and smaller inexpensive antennas to create microcells that can be accessed concurrently by 6G devices, or by relying on smart devices and smart surfaces (internet of everything) as networking elements to create microcells, or some combination, leading to ambient connectivity. Mobile edge computing and core computing will certainly be completely integrated. Another theoretical solution is solving the full duplex transmission problem, which would allow two-way transmission on the same frequency, at the same time, doubling the capacity of current bandwidths. Using some or all of this new architecture, 6G networks are expected to support data rates of 1 terabit per second (Tbps), that’s 1,000,000 Mbps.

What is A-CDM?

A-CDM is Adaptive Common Data Model, a more advanced version of the legacy Common Data Model. A-CDM provides metrics and KPI s from flow data for a perspective from the application point of view and network information for a view from the network perspective. The Adaptive CDM data set provides both points of view that are essential in fully...

A-CDM is Adaptive Common Data Model, a more advanced version of the legacy Common Data Model. A-CDM provides metrics and KPI s from flow data for a perspective from the application point of view and network information for a view from the network perspective. The Adaptive CDM data set provides both points of view that are essential in fully understanding the user experience.

What is Access Control?

The process of granting or denying specific requests to: 1) obtain and use information and related information processing services; and 2) enter specific physical facilities (e.g., federal buildings, military establishments, and border crossing entrances).

What is Access Control Entry?

Access Control Entry (ACE) is a specific entry in an access control list.

Cybersecurity Awareness Month

In case you missed it...

Every October, the NETSCOUT team promotes the conversation around Cybersecurity Awareness Month. We share resources and expertise on how everyone, from end users to service providers, can improve their cyber literacy, keep up with the newest technologies, and join the industry.

Each week of CSAM, we unveil new content, and then keep it accessible throughout the following calendar year.

Cybersecurity Awareness Month

More questions? Talk to an expert.