IT Glossary

Clear explanations of the most important IT and networking terms.

This content was AI-assisted and editorially reviewed.
2

2.4 GHz WLAN Band

The original Wi-Fi frequency band, used by 802.11b/g/n/ax. The 2.4 GHz ISM band spans 2.400–2.4835 GHz and is divided into 13 or 14 channels (region-dependent) of 22 MHz width, with only 3 truly non-overlapping channels (1, 6, 11) in a 20 MHz configuration. Its advantages are long range (up to 70m indoors) and excellent wall penetration. Its significant disadvantages in event environments include extreme congestion, interference from Bluetooth, DECT phones, and microwave ovens, and its use of the same spectrum range as many wireless audio and IEM systems. In dense event venues, 2.4 GHz Wi-Fi should be minimized or avoided for production-critical applications.

5

5 GHz WLAN Band

The frequency band used by 802.11a/n/ac/ax, spanning roughly 5.150–5.850 GHz (region-dependent). The 5 GHz band offers up to 25 non-overlapping 20 MHz channels, with support for wider 40/80/160 MHz channels for higher throughput. Shorter range than 2.4 GHz (due to higher frequency attenuation), but significantly less congested. Some 5 GHz channels require Dynamic Frequency Selection (DFS) to avoid interfering with radar systems. In event productions, 5 GHz is the primary band for production Wi-Fi, offering clean, high-capacity connections for wireless consoles, monitoring systems, and crew devices.

6

6 GHz WLAN Band (Wi-Fi 6E / Wi-Fi 7)

A new frequency band opened for Wi-Fi use in many regions from 2020 onwards, spanning 5.925–7.125 GHz. Exclusively available to Wi-Fi 6E (802.11ax) and Wi-Fi 7 (802.11be) devices. The 6 GHz band provides up to 59 non-overlapping 20 MHz channels — or 7 non-overlapping 160 MHz channels — in completely uncongested spectrum with no legacy devices, no DFS requirements in most regions, and no interference from older Wi-Fi generations. In event productions, the 6 GHz band is rapidly becoming the preferred choice for high-density, latency-sensitive wireless applications including wireless control surfaces and real-time monitoring.

8

802.11a (Wi-Fi 2)

Released in 1999 alongside 802.11b, 802.11a operates in the 5 GHz band with a maximum theoretical rate of 54 Mbps using OFDM (Orthogonal Frequency Division Multiplexing). Its use of the less congested 5 GHz band was ahead of its time, though its shorter range (~35m indoors) limited adoption. The 5 GHz band it pioneered is now fundamental for modern high-density event Wi-Fi deployments.

802.11ac (Wi-Fi 5)

Ratified in 2013, 802.11ac operates exclusively on the 5 GHz band and introduced wider channels (up to 160 MHz), more MIMO spatial streams (up to 8), and 256-QAM modulation. Wave 2 added MU-MIMO (Multi-User MIMO), allowing simultaneous transmission to multiple clients. Maximum theoretical speed reaches 6.9 Gbps. 802.11ac is widely deployed in professional event environments for its clean 5 GHz performance and high device density support.

802.11ax (Wi-Fi 6 / Wi-Fi 6E)

Ratified in 2021, 802.11ax (Wi-Fi 6) is designed for high-density environments, introducing OFDMA (Orthogonal Frequency Division Multiple Access), BSS Coloring, Target Wake Time (TWT), and 1024-QAM modulation. Wi-Fi 6E extends operation into the 6 GHz band, adding up to 1.2 GHz of new spectrum with 59 additional 20 MHz channels. Theoretical speeds reach 9.6 Gbps. Wi-Fi 6/6E is the recommended standard for large event deployments with hundreds or thousands of simultaneous clients.

802.11b (Wi-Fi 1)

The first widely adopted Wi-Fi standard, released in 1999, operating in the 2.4 GHz band with a maximum theoretical data rate of 11 Mbps using DSSS (Direct Sequence Spread Spectrum) modulation. Range up to ~35m indoors. Now obsolete and rarely deployed, but legacy 802.11b clients can drastically slow down a modern network due to protection mechanisms. In event environments, 802.11b devices should be blocked to protect network performance.

802.11be (Wi-Fi 7)

The latest Wi-Fi generation, finalized in 2024, 802.11be (Wi-Fi 7) operates on 2.4 GHz, 5 GHz, and 6 GHz simultaneously via Multi-Link Operation (MLO). It supports 320 MHz channels, 4096-QAM modulation, and up to 16 spatial streams, achieving theoretical speeds over 46 Gbps. MLO enables devices to transmit and receive across multiple bands simultaneously, drastically reducing latency and improving reliability — highly relevant for demanding event control and real-time media applications.

802.11g (Wi-Fi 3)

Released in 2003, 802.11g brought OFDM modulation to the 2.4 GHz band, achieving up to 54 Mbps while remaining backward compatible with 802.11b. It became the dominant standard through the mid-2000s. Like 802.11b, it is now considered legacy. In event networks, the presence of 802.11g clients triggers protection overhead that reduces throughput for all users on the same access point.

802.11k/v/r – Assisted Roaming

A trio of IEEE amendments that together enable intelligent, fast Wi-Fi roaming. 802.11k (Radio Resource Management) allows clients to request a neighbor AP report, building a list of candidate APs for roaming. 802.11v (BSS Transition Management) allows the network to suggest or direct a client to roam to a better AP. 802.11r (Fast BSS Transition) accelerates the re-authentication process during a roam. In event productions with mobile operators, these three standards working together eliminate the roaming latency and connection gaps that could interrupt wireless console control or in-ear monitoring feedback systems.

802.11n (Wi-Fi 4)

Ratified in 2009, 802.11n introduced MIMO (Multiple Input, Multiple Output) antenna technology and operates on both 2.4 GHz and 5 GHz bands. It supports channel bonding (20/40 MHz), achieving theoretical speeds up to 600 Mbps. 802.11n significantly improved range and throughput and is still found on many devices. In event networks, 802.11n on 2.4 GHz remains problematic in crowded venues due to co-channel interference from the limited number of non-overlapping channels.

802.1Q Double Tagging (QinQ / 802.1ad)

A technique (standardized as IEEE 802.1ad) that encapsulates one 802.1Q-tagged frame inside another outer VLAN tag, allowing VLAN namespaces to be nested. Also known as Provider Bridging or QinQ. In large-scale event productions spanning multiple venues or broadcast facilities connected over carrier networks, QinQ enables independent VLAN numbering at each site to be tunneled transparently over a shared transport network without VLAN ID conflicts.

A

Access Port

A switch port assigned to a single VLAN, used to connect end devices such as audio consoles, lighting controllers, or computers. Frames on access ports are untagged from the device's perspective. In event setups, access ports ensure that each device is placed in the correct logical network segment without requiring VLAN-aware end devices.

ACL (Access Control List)

A list of rules applied to a network interface or VLAN that permits or denies traffic based on criteria such as source/destination IP, port number, or protocol. ACLs can be implemented on routers and Layer 3 switches as a lightweight firewall alternative. In event networks, ACLs enforce traffic policies between VLANs, preventing unauthorized access to audio or video infrastructure.

AES-CCMP (Advanced Encryption Standard – Counter Mode with CBC-MAC Protocol)

The mandatory encryption algorithm for WPA2, based on the AES block cipher with 128-bit keys. CCMP (Counter Mode with CBC-MAC Protocol) provides both data confidentiality and integrity/authentication in a single efficient mechanism. AES-CCMP is the gold standard for Wi-Fi encryption and is computationally fast on modern hardware. All production-grade event network Wi-Fi infrastructure should use AES-CCMP as the minimum encryption standard.

AES67

An audio-over-IP interoperability standard published by the Audio Engineering Society, enabling different IP audio systems (e.g., Dante, RAVENNA, Q-LAN) to exchange audio streams. AES67 is based on RTP over UDP multicast, uses IEEE 1588 PTP for synchronization, and supports high channel counts with low latency. In event productions, AES67 bridges audio systems from different manufacturers on a common IP network.

ARP (Address Resolution Protocol)

A Layer 2/3 protocol used to map a known IP address to a MAC address within a local network segment. ARP broadcasts a request to all devices asking 'who has this IP?' and the owner responds with its MAC. In large event networks, excessive ARP traffic can be a sign of misconfiguration or broadcast storms.

Art-Net

A UDP-based protocol for transporting DMX512 data over Ethernet networks, developed by Artistic Licence. Art-Net uses UDP broadcast or unicast (Art-Net 4 supports unicast) to deliver lighting control data. Widely supported in the event and entertainment lighting industry. Art-Net broadcast traffic can cause issues on large networks; unicast mode or proper network segmentation is recommended.

B

Bandwidth

The maximum data transfer rate of a network link, typically measured in Megabits per second (Mbps) or Gigabits per second (Gbps). In event network design, bandwidth planning must account for audio channels (e.g., Dante), video streams (e.g., NDI, ST 2110), control data, and management traffic simultaneously. Insufficient bandwidth causes packet loss, jitter, and dropouts.

BPDU Guard

A network security feature that disables a switch port if a BPDU (Bridge Protocol Data Unit) is received on it, preventing unauthorized switches from connecting and potentially disrupting the spanning tree topology. In event environments where crew members may connect their own switches, BPDU Guard on access ports protects the network from accidental loop creation.

Broadcast MAC Address

The MAC address FF:FF:FF:FF:FF:FF, which targets all devices on a local network segment. Broadcast frames are processed by every host on the same Layer 2 domain. Excessive broadcasting in event networks can cause performance issues, especially in large flat networks used at concerts or exhibitions.

Broadcast Storm

A network condition where broadcast or multicast packets are continuously amplified and retransmitted by switches, consuming all available bandwidth and causing complete network failure. Broadcast storms are typically caused by network loops in the absence of Spanning Tree Protocol, or by misconfigured IGMP snooping allowing multicast flooding. In event networks, broadcast storms can instantly bring down audio and video systems.

BSS Coloring

A feature introduced in 802.11ax (Wi-Fi 6) that adds a color identifier to Wi-Fi frames, allowing devices to distinguish between transmissions from their own network (BSS) and neighboring networks on the same channel. Devices can ignore frames from differently colored networks, reducing unnecessary deferrals and improving spatial reuse. BSS Coloring is particularly beneficial in event environments where multiple overlapping Wi-Fi networks from different vendors or organizers share the same spectrum.

BSSID (Basic Service Set Identifier)

The MAC address of a specific access point radio, uniquely identifying a single wireless cell (BSS). While multiple APs share the same SSID, each has a unique BSSID. Client devices use the BSSID to distinguish between access points offering the same network name. In event network troubleshooting, monitoring the BSSID a device is associated with identifies which physical access point is serving that device, which is essential for diagnosing roaming issues, coverage gaps, or AP-specific problems.

Bufferbloat

A network condition where excessively large buffers in routers or switches cause high latency and jitter for all traffic, including real-time audio and video, even when the link is not fully congested. When a large buffer fills with bulk TCP traffic, real-time packets must wait behind hundreds of megabytes of data before being transmitted. In event networks, bufferbloat is mitigated by properly sizing queues, enabling active queue management (WRED/ECN), and ensuring QoS policies prevent bulk traffic from entering the same queue as latency-sensitive media.

C

CAT6 / CAT6A Cable

Category 6 and 6A twisted-pair copper Ethernet cables supporting 1 Gbps (CAT6, up to 55m at 10 Gbps) and 10 Gbps (CAT6A, up to 100m) respectively. The standard cabling medium for connecting end devices in event productions. CAT6A is recommended for new event network installations to support future 10 Gbps requirements. Proper termination and cable management are critical in temporary event environments.

CBWFQ (Class-Based Weighted Fair Queuing)

An extension of WFQ that applies weighted fair queuing to explicitly defined traffic classes rather than individual flows. Each class is assigned a minimum bandwidth guarantee, and surplus bandwidth is distributed proportionally. CBWFQ is commonly implemented on Cisco routers and Layer 3 switches as part of MQC (Modular QoS CLI) policy maps. In event networks with WAN uplinks for streaming or remote production, CBWFQ ensures that each traffic class — audio, video, control, management — receives its required minimum bandwidth share.

CIDR (Classless Inter-Domain Routing)

A method for allocating IP addresses and routing that replaces the older class-based system. CIDR notation expresses the network prefix length after a slash (e.g., 192.168.10.0/24). Event network engineers use CIDR to efficiently allocate address space across VLANs and subnets for different technical departments.

CoS (Class of Service)

A general term for Layer 2 traffic prioritization, most commonly referring to the PCP field in the 802.1Q VLAN tag. CoS and PCP are often used interchangeably in vendor documentation. CoS markings are used by switches to prioritize frame forwarding at Layer 2, independent of Layer 3 DSCP values. In event networks, consistent CoS/PCP markings on trunk links between switches ensure that time-sensitive Dante, NDI, or sACN frames are never delayed behind bulk data traffic.

D

Dante

A proprietary audio-over-IP networking technology developed by Audinate. Dante transmits uncompressed, multi-channel digital audio over standard IP networks with very low latency and sample-accurate synchronization. Widely adopted in the event, broadcast, and installed sound industries. Dante uses UDP multicast for audio transport and mDNS/Bonjour for device discovery. AES67 compatibility enables interoperability with other IP audio systems.

Default Gateway

The IP address of the router or Layer 3 switch that a device sends traffic to when the destination is outside its local subnet. In event networks, the default gateway is typically the core switch or router. Misconfigured gateways are a common cause of devices being unable to reach multicast sources or streaming destinations.

DFS (Dynamic Frequency Selection)

A regulatory requirement for Wi-Fi devices operating on certain 5 GHz channels (UNII-2 and UNII-2e) to detect radar signals and vacate the channel within 10 seconds if radar is detected, preventing interference with weather radar, military radar, and air traffic control systems. A DFS channel switch can cause a Wi-Fi network to go offline for up to 60 seconds during radar detection and channel change. In event environments near airports or with outdoor deployments, DFS-triggered channel changes can be highly disruptive. Using non-DFS 5 GHz channels (UNII-1: 36–48, UNII-3: 149–165) is preferred for production-critical networks.

DHCP (Dynamic Host Configuration Protocol)

A network protocol that automatically assigns IP addresses, subnet masks, default gateways, and DNS servers to devices on a network. In temporary event networks, DHCP simplifies device onboarding but can cause issues if leases expire or addresses change unexpectedly. Critical equipment like audio consoles and media servers should typically use static IPs.

DiffServ (Differentiated Services)

The dominant QoS architecture for IP networks, defined in RFC 2474/2475. DiffServ classifies and marks packets at network entry points using the DSCP field in the IP header, then applies per-hop behaviors (PHBs) at each router or switch based on those markings. DiffServ is scalable and stateless — each device makes independent forwarding decisions without tracking individual flows. It is the foundation of QoS in virtually all professional event and broadcast IP networks.

DNS (Domain Name System)

The system that translates human-readable domain names (e.g., stream.event.com) into IP addresses. DNS operates over UDP/TCP port 53. In event network designs with internet-connected streaming infrastructure, reliable DNS resolution is required for CDN endpoints, cloud services, and remote access systems. Local DNS servers can be deployed for on-site name resolution.

DSCP (Differentiated Services Code Point)

A field in the IP header used to classify and manage network traffic for QoS purposes. DSCP values (0–63) are assigned to packets to indicate their priority level. Common markings include EF (Expedited Forwarding) for real-time audio/video and AF (Assured Forwarding) for important but non-real-time data. Properly configured DSCP markings are essential in event networks to guarantee audio and video stream quality.

DSCP (Differentiated Services Code Point)

A 6-bit field in the IPv4/IPv6 header (part of the former ToS byte) used to classify and mark packets for QoS treatment, providing 64 possible values (0–63). DSCP markings are set by endpoints or trusted network devices and read by each switch and router to determine queuing behavior. In event production networks, DSCP markings define how audio streams (typically marked EF), video streams (typically AF4x or CS4), control traffic (CS3 or AF3x), and best-effort data (CS0/BE) are treated at every hop through the network.

DSCP AF (Assured Forwarding)

A group of DSCP Per-Hop Behaviors defined in RFC 2597, organized into four classes (AF1x–AF4x) each with three drop precedence levels (x1=low, x2=medium, x3=high drop probability). AF provides guaranteed minimum bandwidth per class with differential dropping under congestion. DSCP values range from AF11 (DSCP 10) to AF43 (DSCP 38). In event networks, AF4x (DSCP 34/36/38) is commonly used for professional video streams (NDI, ST 2110), and AF3x for production control and management traffic.

DSCP BE (Best Effort / CS0)

The default DSCP value of 0 (binary 000000), also called Best Effort or Default Forwarding. Packets with DSCP 0 receive no special treatment and are served only when higher-priority queues are not busy. In event networks, unmarked or untrusted traffic (web browsing, software updates, file sync) is typically reclassified to BE at the trust boundary, ensuring it cannot compete with marked production traffic during periods of congestion.

DSCP CS (Class Selector)

DSCP values where the lower 3 bits are zero (CS0–CS7), providing backward compatibility with the 3-bit IP Precedence field. CS0 equals Best Effort (DSCP 0); CS7 (DSCP 56) is reserved for network routing protocols. CS6 (DSCP 48) is used for network control traffic such as OSPF and STP. In event networks, CS3 (DSCP 24) is sometimes used for call signaling (SIP/intercom), and CS1 (DSCP 8) for low-priority background traffic that should yield to all production traffic.

DSCP EF (Expedited Forwarding)

The highest-priority DSCP Per-Hop Behavior, defined in RFC 3246, with a DSCP value of 46 (binary 101110). EF is designed for low-latency, low-jitter, low-loss traffic that requires guaranteed bandwidth — essentially a 'virtual leased line' through the network. In event networks, EF is the correct marking for real-time uncompressed audio streams such as Dante and AES67, where even brief queuing delays cause audible glitches. EF traffic should be strictly rate-limited to prevent it from starving other traffic classes.

DSCP-to-PCP Mapping

The translation table used by switches and routers to map Layer 3 DSCP values to Layer 2 PCP values (and vice versa) when frames cross between routed and switched domains. A common mapping: EF (DSCP 46) → PCP 5, AF4x (DSCP 34–38) → PCP 4, CS0/BE (DSCP 0) → PCP 0. Inconsistent or missing DSCP-to-PCP mappings are a frequent source of QoS failures in event networks — traffic may be correctly marked at Layer 3 but receive wrong Layer 2 priority on switch trunk links.

DWRR (Deficit Weighted Round Robin)

An enhancement of WRR that compensates for variable packet sizes by tracking a 'deficit counter' per queue — ensuring that queues serving larger packets do not receive disproportionately more bytes than their weight specifies. WRR with fixed-size packet assumptions can be unfair when traffic mixes small and large frames. DWRR is more accurate and is the preferred implementation on modern high-performance switches. In event networks with mixed small control packets and large video frames, DWRR provides fairer bandwidth distribution than basic WRR.

Dynamic Routing

A routing method where routers automatically discover and maintain routes using protocols such as OSPF, EIGRP, or BGP. Dynamic routing adapts to network changes and failures. In complex or large-scale event productions with redundant network paths, dynamic routing protocols can provide automatic failover and load balancing.

E

EAP (Extensible Authentication Protocol)

A flexible authentication framework used over 802.1X for WPA-Enterprise networks. EAP supports multiple authentication methods including EAP-TLS (certificate-based, most secure), EAP-TTLS, PEAP (username/password over a TLS tunnel), and EAP-FAST. In event networks, PEAP-MSCHAPv2 is a common choice for its balance of security and ease of deployment. EAP-TLS using client certificates is the gold standard for securing production-critical wireless infrastructure.

ECN (Explicit Congestion Notification)

A TCP/IP mechanism (RFC 3168) that allows routers to signal congestion to endpoints by marking packets rather than dropping them, using the lower 2 bits of the ToS/DSCP byte. ECN-capable endpoints reduce their transmission rate upon receiving marked packets, avoiding the packet loss of tail drop or WRED. In event networks with TCP-based streaming (RTMP, SRT, HLS ingest), ECN-aware infrastructure can reduce unnecessary retransmissions and improve stream stability on congested links without the latency spike caused by packet loss and TCP backoff.

End-to-End QoS

The principle that QoS policies must be consistently configured on every network device in the path between source and destination for prioritization to be effective. A single unconfigured or misconfigured switch or router in the chain — even one with adequate bandwidth — can discard DSCP markings, merge all traffic into a single FIFO queue, or fail to honor priority scheduling. In event networks spanning multiple switches, routers, and potentially WAN links, end-to-end QoS requires coordinated configuration of marking, queuing, and scheduling policies at every hop.

Event Network Design

The structured process of planning and implementing IP network infrastructure for live events, covering topology, IP addressing, VLANs, switching, routing, redundancy, QoS, security, and management. A well-designed event network must reliably support audio-over-IP (Dante/AES67), video-over-IP (NDI/ST 2110), lighting control (sACN/Art-Net), show control (OSC/SIP), internet streaming, and IT services simultaneously.

F

Fast BSS Transition (802.11r)

An IEEE amendment that enables fast roaming between access points in the same network by pre-authenticating a client before it disconnects from its current AP. Without 802.11r, roaming involves a full re-authentication cycle that can take hundreds of milliseconds, causing audio dropouts or control interruptions. In event productions with mobile operators using wireless control surfaces or tablets, 802.11r (combined with 802.11k and 802.11v) ensures seamless connectivity as they move through a venue.

Fiber Optic Cable

A cable that transmits data as pulses of light through glass or plastic fibers, offering high bandwidth, low latency, and immunity to electromagnetic interference over long distances. Single-mode fiber (SMF) supports distances up to 100km+; multi-mode fiber (MMF) is used for shorter runs up to ~550m. In event productions, fiber is the preferred medium for inter-switch backbone links and any runs exceeding 100m.

FIFO (First In, First Out)

The simplest queuing discipline, where packets are transmitted in the exact order they arrive with no prioritization. FIFO is the default behavior on unmanaged switches and unconfigured interfaces. In event production networks, FIFO is completely inadequate — a large file transfer or burst of data can delay or drop real-time audio and video packets waiting in the same queue. FIFO is only acceptable on links with significant headroom above peak utilization, which is rarely guaranteed in dense event deployments.

Firewall

A network security device or software that monitors and controls incoming and outgoing network traffic based on predetermined security rules. Firewalls operate at various OSI layers and can filter by IP address, port, protocol, and application. In event productions, firewalls protect production networks from unauthorized internet access while allowing necessary services like streaming, remote access, and cloud connectivity.

Flow Control (IEEE 802.3x)

A mechanism in Ethernet networks that allows a receiving device to send a PAUSE frame to its sender when its buffer is nearly full, temporarily halting transmission to prevent packet loss. While flow control can help in some scenarios, it can also propagate congestion through a network. In latency-sensitive event networks, flow control behavior should be carefully considered and often disabled on most ports.

G

GCMP (Galois/Counter Mode Protocol)

The encryption protocol used in WPA3, based on AES in Galois/Counter Mode. GCMP is more efficient than CCMP and supports both 128-bit (WPA3-Personal) and 256-bit (WPA3-Enterprise) key lengths. Its use of Galois Message Authentication Code (GMAC) provides stronger integrity protection. GCMP is the current state-of-the-art for Wi-Fi encryption and is required for 802.11ad/ay (WiGig) and mandated by WPA3.

H

HLS (HTTP Live Streaming)

An adaptive bitrate streaming protocol developed by Apple, delivering video over HTTP by breaking streams into small segments and serving them via standard web servers. HLS adapts video quality based on available bandwidth. In the event industry, HLS is widely used for audience-facing live streams delivered through CDNs, websites, and apps, though it typically introduces 5–30 seconds of latency.

HSRP (Hot Standby Router Protocol)

A Cisco proprietary first-hop redundancy protocol similar to VRRP, allowing multiple routers to share a virtual IP and MAC address. The active router handles all traffic; the standby router takes over if the active fails. HSRP is common in event networks built on Cisco infrastructure, providing gateway redundancy for critical production VLANs.

HTTP / HTTPS

Hypertext Transfer Protocol (HTTP) and its secure variant (HTTPS) are application-layer protocols for web-based communication. HTTP runs on port 80, HTTPS on port 443. In event networks, HTTPS is used for web-based management interfaces of switches, audio processors, and media devices, as well as for streaming delivery via HLS and MPEG-DASH. Firewall rules must allow HTTPS for streaming endpoints.

Hybrid SP+WRR Queuing

A common enterprise QoS design combining Strict Priority for the highest-priority queue with Weighted Round Robin for remaining queues. The SP queue (typically for EF-marked real-time audio) is always served first, while WRR distributes remaining bandwidth proportionally among video, control, and best-effort classes. This hybrid model is the recommended approach for event network QoS: it guarantees the lowest latency for audio while preventing starvation of all other traffic. Most professional managed switches support this model natively.

I

IEEE 802.11 (Wi-Fi)

The family of IEEE standards defining wireless local area network (WLAN) communication protocols, commonly known as Wi-Fi. First published in 1997, 802.11 has evolved through multiple generations offering progressively higher data rates, improved spectral efficiency, and better performance in dense environments. In event productions, Wi-Fi is used for wireless control surfaces, mobile monitoring apps, crew devices, and audience connectivity — each requiring careful planning to avoid interference with RF-sensitive production systems.

IEEE 802.1p (QoS Priority / PCP)

An IEEE standard defining the 3-bit Priority Code Point (PCP) field within the 802.1Q VLAN tag, providing 8 levels of Layer 2 Quality of Service (priority 0–7, where 7 is highest). 802.1p allows switches to prioritize time-sensitive traffic at Layer 2, before IP-level DSCP markings take effect. In event networks, 802.1p is used to prioritize real-time audio and video frames (e.g., Dante, ST 2110) over less critical traffic within the same VLAN — especially important on inter-switch trunk links operating near capacity.

IEEE 802.1Q (VLAN Tagging)

The IEEE standard that defines VLAN tagging on Ethernet frames, inserting a 4-byte tag containing a 12-bit VLAN ID (supporting VLANs 1–4094) and a 3-bit PCP (Priority Code Point) field. 802.1Q enables a single physical network to carry multiple isolated logical networks. In event productions, 802.1Q tagging is fundamental infrastructure — separating audio (Dante/AES67), video (NDI/ST 2110), lighting (sACN/Art-Net), production management, and public internet into distinct, non-interfering broadcast domains across shared physical cabling and switch infrastructure.

IEEE 802.3ad / LACP (Link Aggregation Control Protocol)

The IEEE standard for combining multiple physical Ethernet links between two devices into a single logical link (Link Aggregation Group / LAG), increasing total bandwidth and providing redundancy. LACP (Link Aggregation Control Protocol) is the dynamic negotiation protocol defined in 802.3ad (now incorporated into IEEE 802.3-2018). A 4×10 Gbps LAG provides 40 Gbps aggregate bandwidth with automatic failover if one link fails. In event networks, LACP between core switches or between switches and high-throughput servers (e.g., ST 2110 media nodes) is essential for 4K/8K video-over-IP workflows.

IGMP (Internet Group Management Protocol)

A network layer protocol used by hosts and routers to establish and manage multicast group memberships on IPv4 networks. When a device wants to receive a multicast stream (e.g., an audio receiver in a Dante network), it sends an IGMP Join message. Routers and Layer 3 switches use IGMP to decide which interfaces should receive which multicast streams.

IGMP Querier

A router or Layer 3 switch that periodically sends IGMP General Query messages to discover which multicast groups have active members on a network segment. Without an IGMP querier, IGMP snooping may not function correctly, causing multicast traffic to be flooded or dropped. In event networks without a router on the VLAN, a Layer 3 switch or dedicated querier must be configured.

IGMP Snooping

A Layer 2 switch feature that listens to IGMP messages exchanged between hosts and routers to build a table of which switch ports have active multicast group members. Instead of flooding multicast traffic out all ports (which wastes bandwidth), the switch only forwards multicast frames to ports with interested receivers. IGMP snooping is essential in event networks with high-bandwidth multicast streams like Dante or NDI.

IGMP Snooping Querier

A feature on managed switches that enables the switch itself to act as an IGMP querier when no router is present on the subnet. This is critical in event networks where VLANs are used without a dedicated Layer 3 gateway — ensuring IGMP snooping remains functional and multicast streams are properly forwarded only to subscribed ports.

IGMPv2

The second version of IGMP, adding the ability for hosts to send explicit Leave Group messages, allowing faster multicast stream termination. IGMPv2 is widely supported and commonly used in event production environments. It includes a configurable query interval and response time, which affects how quickly unused multicast streams are pruned.

IGMPv3

The third and most current version of IGMP, adding source-specific multicast (SSM) support, allowing receivers to specify not just which group they want but also which source. IGMPv3 is required for SSM applications and is supported by modern protocols like AES67. It provides more granular control over multicast subscriptions in complex event networks.

IntServ / RSVP (Integrated Services / Resource Reservation Protocol)

An alternative QoS architecture (RFC 1633) that reserves end-to-end bandwidth for individual flows using the RSVP signaling protocol. Unlike DiffServ, IntServ guarantees per-flow service but requires every router in the path to maintain flow state and honor reservations. This makes it poorly scalable and largely impractical for large networks. In event contexts, IntServ/RSVP is rarely used in production IP networks but may appear in specialized broadcast or intercom systems that require guaranteed bandwidth paths.

IP Address

An Internet Protocol (IP) address is a logical numeric identifier assigned to each device on a network, operating at Layer 3 of the OSI model. IPv4 addresses are 32-bit numbers written in dotted-decimal notation (e.g., 192.168.1.10). In event networks, IP addressing schemes must be carefully planned to support all devices including consoles, media servers, control systems, and intercoms.

IP Multicast Routing

The process of forwarding multicast IP packets between different network segments or VLANs, requiring a Layer 3 device with multicast routing enabled. Multicast routing is needed when audio or video streams must cross VLAN boundaries in event networks. Protocols like PIM-SM and PIM-DM are used to build multicast distribution trees across routed networks.

IP Precedence

An older QoS marking scheme using the upper 3 bits of the IPv4 ToS field, providing 8 priority levels (0–7). IP Precedence was superseded by DSCP, which uses 6 bits for 64 possible values. However, IP Precedence values map directly to the upper 3 bits of DSCP, maintaining partial backward compatibility. Values 6 and 7 are reserved for network control traffic. In modern event networks, DSCP is used instead of IP Precedence, but understanding the mapping is useful when integrating legacy equipment.

IP Score (Broadcast Transition)

In the broadcast and live event industry, 'IP' broadly refers to the transition from traditional SDI and analog infrastructure to internet protocol-based workflows. An 'IP Score' or 'IP infrastructure' means the entire signal chain — audio, video, communications, and control — travels over Ethernet/IP networks. This enables flexible routing, remote production, and scalable systems but requires deep networking expertise.

IPv4

Internet Protocol version 4 is the fourth iteration of the Internet Protocol, using 32-bit addresses that allow for approximately 4.3 billion unique addresses. Written in dotted-decimal format (e.g., 10.0.0.1). IPv4 remains the dominant protocol in event production networks despite address exhaustion concerns, largely due to private addressing via RFC 1918.

IPv6

Internet Protocol version 6 uses 128-bit addresses, providing a vastly larger address space than IPv4. Written in hexadecimal with colons (e.g., 2001:db8::1). While not yet widely adopted in live event production environments, IPv6 is increasingly relevant for internet-connected broadcast and streaming infrastructure.

J

Jitter

The variation in packet arrival times in a network stream. While some latency is acceptable, inconsistent delivery times (jitter) cause audio glitches, video artifacts, and synchronization errors in real-time media streams. Event networks use QoS prioritization, buffer tuning, and dedicated network infrastructure to minimize jitter. Jitter buffers in audio and video devices compensate for small amounts of network jitter.

Jumbo Frames

Ethernet frames larger than the standard 1500-byte MTU, typically 9000 bytes (9K jumbo frames). Jumbo frames reduce per-packet overhead and improve throughput for high-bandwidth applications. In event networks running high-density ST 2110 video streams, enabling jumbo frames on all switches and endpoints can significantly improve efficiency. All network devices in a path must support the same jumbo frame size.

L

LAG Load Balancing

The method by which a switch distributes traffic across the physical links within a Link Aggregation Group (LAG). Common algorithms include source/destination MAC hash, source/destination IP hash, and Layer 4 port hash. The chosen algorithm determines which flows use which physical link — a critical consideration in event networks where a single high-bandwidth multicast stream (e.g., 4K NDI or ST 2110) must be distributed across links to avoid saturating a single physical member port.

Latency

The time delay between data being sent and received across a network, typically measured in milliseconds. In live event production, latency is critical — especially for stage monitoring audio, camera return feeds, and intercom systems. Network latency in professional AoIP systems like Dante can be as low as 0.25ms on well-configured networks. High latency causes noticeable delays that disrupt performers and operators.

Layer 2 Switch

A network switch that operates at the data link layer (OSI Layer 2), forwarding frames based on MAC addresses. Layer 2 switches handle VLAN tagging, STP, IGMP snooping, and MAC address learning. In event networks, Layer 2 switches form the access and distribution layers, connecting end devices and aggregating traffic to Layer 3 switches or routers.

Layer 3 Switch

A network switch capable of routing IP packets between VLANs and subnets, combining the functionality of a Layer 2 switch and a router in one device. Layer 3 switches perform inter-VLAN routing at wire speed using hardware ASICs. In event network designs, a Layer 3 core switch routes traffic between audio, video, control, and management VLANs while providing the IGMP querier function.

Leaky Bucket

An alternative traffic shaping model where incoming packets fill a virtual bucket that drains at a fixed rate, smoothing all traffic to a constant output rate regardless of burstiness. Unlike the token bucket, the leaky bucket does not allow any bursting above the drain rate. While this provides the smoothest possible traffic profile, it can introduce unnecessary latency for bursty but low-average-rate traffic. In event networks, leaky bucket shaping is used where strict constant bitrate output is required, such as contribution feeds to broadcast facilities with fixed-rate circuits.

M

MAC Address

A Media Access Control (MAC) address is a unique 48-bit hardware identifier assigned to every network interface card (NIC). Written in hexadecimal notation (e.g., 00:1A:2B:3C:4D:5E), it operates at Layer 2 of the OSI model. In event networks, MAC addresses are used for device identification, VLAN assignment, and access control policies on managed switches.

MAC Address Table

A lookup table maintained by network switches that maps MAC addresses to specific switch ports. When a frame arrives, the switch checks this table to determine the correct output port. In large event setups with many devices, understanding MAC table capacity and aging timers is critical to avoid flooding and performance degradation.

Managed Switch

A network switch with advanced configuration and monitoring capabilities including VLAN configuration, IGMP snooping, STP/RSTP, QoS, port mirroring, and SNMP management. Essential for professional event network deployments where traffic must be segmented, prioritized, and monitored. Contrasted with unmanaged switches, which are plug-and-play but lack the configuration options required for production-grade networks.

mDNS (Multicast DNS)

A protocol that enables DNS-like name resolution within a local network without a central DNS server, using multicast address 224.0.0.251. Used by Bonjour (Apple) and similar technologies. Dante and NDI use mDNS for automatic device discovery within a subnet. mDNS does not cross router boundaries, which must be considered when devices span multiple VLANs in event networks.

MIMO (Multiple Input, Multiple Output)

A radio technology that uses multiple antennas at both the transmitter and receiver to simultaneously send and receive multiple data streams (spatial streams), increasing throughput without additional spectrum. Introduced in 802.11n. MU-MIMO (Multi-User MIMO), added in 802.11ac Wave 2, extends this to serve multiple clients simultaneously. In event networks, MIMO and MU-MIMO capable access points are essential for supporting high client density at venues like concerts, conferences, and exhibitions.

MSTP (Multiple Spanning Tree Protocol)

An extension of RSTP defined in IEEE 802.1s that allows multiple spanning tree instances, each covering a group of VLANs. MSTP enables load balancing across redundant links by assigning different VLANs to different spanning tree instances with different root bridges. In event networks with many VLANs and redundant switch paths, MSTP provides efficient use of available bandwidth.

MTU (Maximum Transmission Unit)

The maximum size of a single packet that can be transmitted over a network link, typically 1500 bytes for standard Ethernet. Packets larger than the MTU must be fragmented. In event networks with VLAN tags, VPN tunnels, or overlay networks, the effective MTU may be reduced. IP fragmentation increases CPU load and can cause issues with latency-sensitive protocols, making MTU consistency important.

Multicast

A network communication method where data is sent from one source to multiple specific receivers simultaneously, without duplicating traffic unnecessarily. Operating at both Layer 2 and Layer 3, multicast is fundamental in event production for distributing audio (e.g., Dante, AES67), video (e.g., NDI, ST 2110), and control data to many endpoints efficiently.

Multicast Group

A logical grouping of devices that have expressed interest in receiving a particular multicast stream. Identified by a Class D IP address (224.0.0.0 – 239.255.255.255). In event networks, a Dante audio stream or an NDI video feed will be associated with a specific multicast group that receivers join.

Multicast IP Address

An IP address in the range 224.0.0.0 to 239.255.255.255 used to identify a multicast group. Addresses in 224.0.0.0/24 are link-local and not forwarded by routers. Event protocols like Dante use addresses in the 239.x.x.x administratively scoped range. Proper multicast address planning avoids conflicts between different audio and video systems.

Multicast MAC Address

A MAC address that represents a group of devices. The least significant bit of the first byte is 1. Multicast MAC addresses are used to deliver frames to multiple devices simultaneously without broadcasting to all. In the event industry, multicast MACs are essential for efficient distribution of audio, video, and control data streams.

N

NAT (Network Address Translation)

A technique that modifies IP address information in packet headers as they pass through a router, allowing private IP addresses to communicate with public internet addresses. NAT is essential in event productions for sharing a single public IP address among many production devices. However, NAT can complicate multicast and certain real-time protocols that embed IP addresses in their payloads.

Native VLAN (802.1Q)

The VLAN assigned to untagged frames received on a trunk port. Frames belonging to the native VLAN are sent untagged on trunk links by default. The native VLAN is VLAN 1 by default on most switches but should be changed to an unused VLAN as a security best practice to prevent VLAN hopping attacks. In event network design, misconfigured native VLANs are a common source of unexpected traffic leakage between segments — particularly problematic when mixing audio, video, and management traffic.

NDI (Network Device Interface)

A royalty-free IP video standard developed by NewTek (now Vizrt) that enables video sources to be discovered and shared across a standard Gigabit Ethernet network. NDI supports high-quality, low-latency video over standard IP infrastructure without dedicated hardware. Widely used in event production, broadcast, and live streaming for connecting cameras, computers, and production switchers. NDI uses mDNS for discovery and UDP multicast for transport.

Network Loop

A condition where packets circulate indefinitely between switches due to redundant physical connections without a loop-prevention mechanism like STP/RSTP. Network loops cause broadcast storms, MAC table instability, and complete network outages within seconds. In event setups, loops can be accidentally created by crew members connecting cables between switches. BPDU Guard and proper STP configuration prevent this.

Network Redundancy

The practice of providing multiple physical or logical paths between network nodes so that a single failure does not cause a complete outage. In live event production, network redundancy is critical — audio or video dropouts during a show are unacceptable. Redundancy is achieved through dual uplinks, RSTP/MSTP, LACP, VRRP, and protocol-level redundancy in media systems like Dante Redundancy or ST 2110 primary/secondary networks.

Network Segmentation

The practice of dividing a network into smaller, isolated segments using VLANs, subnets, or physical separation to improve performance, security, and manageability. In event network design, segmentation isolates audio traffic (Dante/AES67 VLAN), video traffic (NDI/ST 2110 VLAN), lighting control (sACN/Art-Net VLAN), IT management, and public internet access — preventing interference between systems.

NTP (Network Time Protocol)

A networking protocol designed to synchronize clocks of computers over a network to within milliseconds of Coordinated Universal Time (UTC). NTP uses a hierarchical system of time sources called strata. In event production networks, accurate time synchronization via NTP is foundational for log correlation, scheduled events, and protocols like PTP/IEEE 1588 that depend on it.

O

OFDMA (Orthogonal Frequency Division Multiple Access)

Introduced in 802.11ax (Wi-Fi 6), OFDMA divides a Wi-Fi channel into smaller sub-channel units called Resource Units (RUs), allowing an access point to simultaneously transmit to multiple clients in the same time slot. Unlike OFDM (used in older standards) which served one client at a time per channel, OFDMA dramatically improves efficiency in high-density environments. This is particularly valuable in large event venues where many devices compete for airtime simultaneously.

OSC (Open Sound Control)

A communication protocol for real-time interaction between computers, sound synthesizers, and multimedia devices over IP networks. OSC uses UDP (or optionally TCP) and supports a flexible addressing scheme with typed arguments. In event productions, OSC is used for show control integration, connecting audio consoles, media servers, lighting systems, and automation platforms.

OSPF (Open Shortest Path First)

A link-state interior gateway routing protocol that calculates the shortest path between routers using Dijkstra's algorithm. OSPF is widely used in enterprise and broadcast networks. In event productions with multiple interconnected network segments, OSPF enables automatic route distribution and fast convergence during link failures.

OWE (Opportunistic Wireless Encryption / Enhanced Open)

A WPA3 feature for open Wi-Fi networks (those without a password) that provides unauthenticated but encrypted connections using Diffie-Hellman key exchange. OWE prevents passive eavesdropping on open networks without requiring users to enter a password. In event productions, OWE is ideal for guest or audience Wi-Fi networks where a password-free experience is desired but basic privacy from packet sniffing is still required.

P

Packet Loss

The failure of transmitted packets to reach their destination, expressed as a percentage of total packets sent. Even small amounts of packet loss (>0.1%) cause audible audio artifacts or visible video glitches in real-time media streams. Packet loss in event networks is typically caused by network congestion, duplex mismatches, faulty cables, or misconfigured switches. Most real-time protocols (UDP-based) do not retransmit lost packets.

PCP (Priority Code Point / 802.1p)

A 3-bit field within the IEEE 802.1Q VLAN tag providing 8 priority levels (0–7) for Layer 2 Quality of Service. Also known as CoS (Class of Service). PCP operates at the Ethernet frame level before IP headers are examined, making it effective for prioritizing traffic between switches on trunk links. In event networks, PCP markings ensure that high-priority audio and video frames are dequeued first on inter-switch links, even before the switch performs IP-level DSCP inspection. PCP 7 is typically reserved for network control; PCP 5–6 for real-time media.

PIM (Protocol Independent Multicast)

A routing protocol suite used to route multicast traffic between different network segments or VLANs. PIM works with existing unicast routing tables to build multicast distribution trees. In event productions requiring multicast routing across subnets — such as distributing a video stream to multiple rooms — PIM is configured on Layer 3 switches or routers.

PMF (Protected Management Frames / 802.11w)

An IEEE 802.11w amendment that extends encryption to Wi-Fi management frames (such as deauthentication and disassociation frames), which are normally transmitted in the clear. Without PMF, attackers can send forged deauthentication frames to forcibly disconnect devices from an access point — a common denial-of-service attack at events. PMF is mandatory in WPA3 and strongly recommended in WPA2 deployments. In event networks, PMF protects wireless control surfaces and monitoring devices from targeted disruption.

PoE (Power over Ethernet)

A technology that delivers electrical power alongside data over standard Ethernet cables, eliminating the need for separate power supplies. IEEE 802.3af (15.4W), 802.3at (30W), and 802.3bt (up to 90W) define different power levels. In event productions, PoE powers devices like wireless access points, IP cameras, intercoms, and small network switches, reducing cable runs and simplifying deployment.

Port Mirroring (SPAN)

A switch feature that copies traffic from one or more source ports to a designated mirror port, allowing passive network analysis without interrupting traffic flow. Used with packet analyzers like Wireshark, port mirroring is invaluable for diagnosing network issues in event productions — capturing Dante, NDI, or streaming traffic for analysis without taking devices offline.

PortFast (STP Edge Port)

A Cisco STP feature (standardized as 'Edge Port' in RSTP) that allows access ports connected to end devices to transition immediately to forwarding state, bypassing the normal listening and learning phases. Critical in event networks where devices are frequently plugged in and must be reachable immediately without waiting for STP convergence. Should only be enabled on ports connected to end devices, never to other switches.

PSK (Pre-Shared Key)

An authentication method used in WPA2-Personal and WPA3-Personal (SAE) where all devices authenticate using the same password, from which a session key is derived. PSK is simple to deploy but has significant limitations in event networks: a shared password known to many people is difficult to rotate, and WPA2-PSK is vulnerable to offline dictionary attacks if a handshake is captured. For sensitive production networks, WPA2/WPA3-Enterprise with individual credentials is strongly preferred over PSK.

PTP / IEEE 1588 (Precision Time Protocol)

A protocol for clock synchronization across a network, achieving sub-microsecond accuracy — far more precise than NTP. PTP is fundamental to professional audio-over-IP systems like AES67 and Dante, and video-over-IP systems like SMPTE ST 2110, where sample-accurate synchronization between sources and receivers is required. Requires PTP-aware (hardware timestamping) network switches for best performance.

Q

QoS (Quality of Service)

A set of network mechanisms that prioritize certain types of traffic over others to ensure consistent performance for latency-sensitive applications. In event networks, QoS is configured to prioritize real-time audio and video traffic (e.g., AES67, Dante, ST 2110) over less time-sensitive traffic like file transfers or web browsing, preventing audio dropout or video glitches during peak network load.

QoS Classification

The process of identifying and categorizing network traffic into classes based on criteria such as DSCP markings, PCP values, IP addresses, TCP/UDP port numbers, or application-layer signatures (NBAR). Classification is the first step in any QoS policy — traffic must be correctly identified before it can be marked and queued appropriately. In event networks, classification maps Dante UDP streams, NDI video flows, sACN multicast, and OSC control packets to their respective QoS classes at the network edge.

QoS Marking

The act of writing a DSCP value into the IP header or a PCP value into the 802.1Q VLAN tag to indicate a packet's priority class for downstream network devices. Marking is ideally done by the traffic source (audio interface, media server, console) at the point of origination. When endpoints cannot mark their own traffic, the first trusted switch or router in the network remarkes packets based on classification rules. Consistent, correct marking end-to-end is the foundation of a functioning QoS policy in event production networks.

QoS Re-marking

The process of overwriting existing DSCP or PCP values on packets as they enter a trusted network boundary, correcting incorrect or missing markings from untrusted sources. Re-marking is applied at the QoS trust boundary — typically the access port of the first managed switch. In event networks, a laptop or consumer device may mark its traffic with arbitrary DSCP values; re-marking at ingress ensures those values are overwritten with appropriate classifications before the traffic enters the production network core.

QoS Trust Boundary

The point in a network where incoming QoS markings (DSCP or PCP) are either trusted and passed through, or distrusted and re-marked by the network device. Devices within the trusted domain (managed switches, professional audio/video endpoints) have their markings honored. Devices outside the boundary (end-user laptops, consumer gear) are untrusted — their markings are overwritten. In event networks, the trust boundary is typically set at the access port of the first managed switch, ensuring only authorized traffic receives priority treatment.

Queue Depth and Buffer Size

The maximum number of packets or bytes a QoS queue can hold before tail drop or active queue management begins discarding packets. Larger buffers absorb more burst traffic but introduce more queuing latency (bufferbloat). Smaller buffers reduce latency but increase the risk of drops during bursts. In event networks, the high-priority audio queue (EF/Strict Priority) should have a small, shallow buffer to minimize latency, while lower-priority queues can have larger buffers to absorb file transfer or streaming bursts without drops.

R

RADIUS (Remote Authentication Dial-In User Service)

A networking protocol that provides centralized authentication, authorization, and accounting (AAA) for network access, commonly used as the backend for WPA-Enterprise (802.1X) Wi-Fi authentication. When a device tries to connect to a WPA-Enterprise network, the access point relays credentials to the RADIUS server, which validates them and returns an accept or reject. In event productions, a RADIUS server enables individual device authentication, access policy enforcement, and detailed connection logging.

Rapid Spanning Tree Protocol (RSTP)

An enhancement of STP defined in IEEE 802.1w, providing much faster convergence (typically under 1 second) when network topology changes occur. RSTP introduces port roles (root, designated, alternate, backup) and states that allow faster transition to forwarding. RSTP is the minimum acceptable standard for event network infrastructure where switch-level redundancy is required.

Routing

The process of forwarding IP packets between different network segments or subnets based on routing tables. Performed by routers or Layer 3 switches. In event networks, routing is required when different functional VLANs (audio, video, control, management) need to communicate with each other or reach the internet for streaming and remote access.

RTCP (RTP Control Protocol)

A companion protocol to RTP that provides out-of-band statistics and control information for RTP sessions. RTCP carries reports on packet loss, jitter, and round-trip delay, allowing senders and receivers to monitor stream quality. In event streaming setups, RTCP data helps diagnose network problems affecting audio or video streams before they become audible or visible.

RTMP (Real-Time Messaging Protocol)

A TCP-based protocol originally developed by Adobe for streaming audio, video, and data over the internet. RTMP maintains a persistent connection between encoder and streaming server, delivering low-latency streams. Widely used in the event industry for live streaming to platforms like YouTube Live, Facebook Live, and proprietary CDNs. RTMP typically runs on port 1935.

RTP (Real-time Transport Protocol)

A network protocol for delivering audio and video over IP networks in real time. RTP runs over UDP and provides sequence numbering, timestamping, and payload type identification. Used as the transport layer for AES67, SMPTE ST 2110, SIP-based telephony, and many streaming applications in the event industry. RTCP is its companion protocol for quality monitoring.

RTSP (Real Time Streaming Protocol)

An application-level network protocol for controlling streaming media servers. RTSP acts like a remote control, using commands like PLAY, PAUSE, and TEARDOWN to control media delivery. It typically works alongside RTP for actual media transport. In the event industry, RTSP is used in IP camera systems, video matrix routers, and broadcast equipment for stream setup and control.

S

sACN / E1.31 (Streaming ACN)

A standard for transporting DMX512 lighting control data over IP networks, defined in ANSI E1.31. sACN uses UDP multicast to distribute up to 63,999 universes of DMX data efficiently across a network. In event lighting systems, sACN-capable consoles and nodes communicate over the same network infrastructure used for audio and video, requiring proper IGMP snooping and QoS configuration.

SAE (Simultaneous Authentication of Equals)

The authentication method used in WPA3-Personal, based on the Dragonfly key exchange protocol. Unlike PSK (which sends a verifiable hash of the password), SAE performs a zero-knowledge proof exchange, meaning the password is never transmitted and cannot be captured for offline cracking. SAE also provides forward secrecy — each session uses a unique key, so compromising one session does not expose past or future sessions. This is highly relevant in event environments where network passwords may be shared among large crews.

SDI (Serial Digital Interface)

A family of digital video interfaces (e.g., 3G-SDI, 12G-SDI) standardized by SMPTE, traditionally used for uncompressed video transport over coaxial cable. While SDI is a physical video interface rather than a network protocol, understanding SDI is important context for IP-based video transitions in the event industry. IP protocols like ST 2110 are designed as SDI replacements.

SFP / SFP+ (Small Form-factor Pluggable)

Hot-swappable optical or electrical transceiver modules used in network switches and other equipment to connect via fiber or copper. SFP supports up to 1 Gbps; SFP+ up to 10 Gbps; QSFP up to 40/100 Gbps. In event network infrastructure, fiber SFP modules are used for long-distance inter-switch links across large venues, providing immunity to electrical interference and ground loops.

SIP (Session Initiation Protocol)

A signaling protocol for initiating, maintaining, and terminating real-time communication sessions including voice, video, and messaging over IP. SIP is widely used for IP-based intercom systems, broadcast talkback, and telephony integration in event productions. SIP sets up the call session while RTP carries the actual media. Firewall and NAT traversal can complicate SIP deployments.

SMPTE ST 2110

A suite of SMPTE standards for transporting uncompressed professional media (video, audio, ancillary data) over IP networks. ST 2110-20 covers video, ST 2110-30/31 cover audio (compatible with AES67), and ST 2110-40 covers ancillary data. ST 2110 uses RTP over UDP multicast and requires precise PTP synchronization. It is the professional broadcast standard for IP-based production infrastructure in large events and studios.

SNMP (Simple Network Management Protocol)

A protocol for collecting and organizing information about managed network devices (switches, routers, servers) and for modifying device behavior. SNMP agents on devices report metrics like bandwidth utilization, error rates, and port status to a network management system. In event productions, SNMP monitoring provides real-time visibility into network health during shows.

Spanning Tree Protocol (STP)

An IEEE 802.1D Layer 2 protocol designed to prevent network loops in Ethernet networks with redundant paths. STP elects a root bridge and blocks redundant paths, ensuring a loop-free topology. While critical for network stability, classic STP has slow convergence times (30–50 seconds) that make it unsuitable for live event environments where rapid failover is needed.

SRT (Secure Reliable Transport)

An open-source video transport protocol developed by Haivision, designed for reliable low-latency video streaming over unpredictable networks like the public internet. SRT uses UDP with forward error correction (FEC) and retransmission to recover from packet loss while maintaining low latency. Increasingly used in event productions for remote contribution, virtual sets, and cloud-based video routing.

SSH (Secure Shell)

A cryptographic network protocol for secure remote access to network devices and servers over an unsecured network. SSH encrypts the communication channel, preventing eavesdropping and tampering. In event network management, SSH is the standard method for securely accessing switches, routers, and servers for configuration, monitoring, and troubleshooting.

SSID (Service Set Identifier)

The name of a Wi-Fi network as broadcast by access points in beacon frames and probe responses. Multiple access points can broadcast the same SSID to form an Extended Service Set (ESS) that clients roam between seamlessly. In event network design, SSIDs are typically organized by function (e.g., PROD-Audio, PROD-Video, CREW, GUEST) with appropriate security settings for each. Hiding SSIDs (disabling beacon broadcast) provides no real security benefit and can complicate roaming behavior.

Stateful Firewall

A firewall that tracks the state of active network connections and makes filtering decisions based on the context of traffic flows, not just individual packets. Stateful firewalls understand TCP sessions and can block unexpected inbound traffic that wasn't part of an established connection. Common in event network security design to protect control systems and media infrastructure.

Static Routing

A routing method where network paths are manually configured by a network administrator and do not change automatically. Static routes are simple and predictable, making them common in event network deployments where topology is fixed. However, they require manual updates if the network changes and provide no automatic failover.

STP Port States

In Spanning Tree Protocol, switch ports transition through states: Blocking, Listening, Learning, and Forwarding (classic STP) or Discarding, Learning, and Forwarding (RSTP). Ports in Blocking/Discarding state do not forward traffic but listen for BPDUs. Understanding port states is essential when diagnosing connectivity issues in event networks with redundant switch connections.

STP Root Bridge

The central switch in a Spanning Tree topology from which all other switches calculate their shortest path. The root bridge is elected based on the lowest bridge priority, then lowest MAC address. In event networks, the root bridge should be manually designated to be the core or aggregation switch, ensuring predictable traffic paths and optimal performance.

Strict Priority Queuing (SP)

A queuing discipline where the scheduler always serves the highest-priority non-empty queue before any lower-priority queue. Traffic in lower-priority queues is only transmitted when all higher-priority queues are empty. Strict Priority delivers the lowest possible latency and jitter for the highest-priority class, making it ideal for real-time audio (Dante, AES67) marked EF in event networks. The critical risk is starvation — if high-priority traffic is excessive, lower-priority queues may never be served. SP is therefore often combined with rate limiting on the high-priority queue or paired with WRR for lower classes.

Subnet Mask

A 32-bit number that divides an IP address into network and host portions. Written in dotted-decimal (e.g., 255.255.255.0) or CIDR notation (e.g., /24). In event networks, subnetting is used to segment traffic by function — separating audio, video, control, and management traffic onto different logical networks.

T

Tail Drop

The simplest queue congestion response: when a queue is full, all newly arriving packets are dropped until space becomes available. Tail drop is the default behavior on most network devices with no active queue management. In event networks, tail drop on a congested interface will indiscriminately discard audio and video packets along with bulk data, causing stream dropouts. Tail drop also contributes to TCP global synchronization — multiple TCP flows simultaneously back off and restart, causing oscillating congestion. RED or WRED should be used instead for TCP-based traffic.

TCP (Transmission Control Protocol)

A connection-oriented Layer 4 protocol that provides reliable, ordered, and error-checked delivery of data between applications. TCP establishes a connection via a three-way handshake (SYN, SYN-ACK, ACK) and uses acknowledgments, retransmissions, and flow control. In the event industry, TCP is used for control protocols, file transfers, streaming protocols like RTMP, and remote management of devices.

TCP Congestion Control

A set of algorithms (e.g., CUBIC, BBR, Reno) used by TCP to avoid overloading the network by dynamically adjusting the transmission rate based on perceived congestion. In live event streaming over internet connections, congestion control behavior directly impacts stream stability and latency. BBR is increasingly preferred for low-latency streaming scenarios.

TCP MSS (Maximum Segment Size)

The largest amount of data, in bytes, that a TCP segment can carry in a single packet, not including TCP/IP headers. Typically 1460 bytes for standard Ethernet (MTU 1500 minus 40 bytes of headers). In event networks traversing VPN tunnels or VLAN-tagged paths with reduced MTU, MSS clamping may be required to prevent fragmentation and improve streaming reliability.

TCP Three-Way Handshake

The process by which a TCP connection is established: the client sends a SYN packet, the server responds with SYN-ACK, and the client confirms with ACK. This handshake introduces a small latency overhead. In event networks, understanding this process is important when diagnosing slow connection establishment between control systems, media servers, or streaming encoders.

TCP Window Size

The amount of data a receiver can buffer before requiring an acknowledgment from the sender, controlling the flow of data between sender and receiver. A larger window size allows more data to be in transit simultaneously, improving throughput on high-latency links. In event streaming workflows over WAN connections, TCP window size tuning can significantly affect video and audio stream quality.

TKIP (Temporal Key Integrity Protocol)

An interim encryption protocol introduced as part of WPA in 2003 to address WEP's critical weaknesses without requiring hardware replacement. TKIP wraps RC4 with per-packet key mixing, a message integrity check (Michael MIC), and a sequence counter to prevent replay attacks. While a significant improvement over WEP, TKIP is also considered broken — vulnerabilities were demonstrated as early as 2008. TKIP is deprecated in 802.11-2012 and must not be used in professional event networks.

Token Bucket

The mathematical model underlying most traffic shaping and policing implementations. Tokens accumulate in a virtual bucket at the committed rate; each transmitted byte consumes a token. When tokens are available, packets are transmitted immediately. When the bucket is empty, packets are either delayed (shaping) or dropped/re-marked (policing). The bucket size (burst size) determines how much instantaneous bursting is allowed. In event streaming, understanding token bucket parameters helps configure encoders and network devices to allow short bursts without triggering policing actions.

ToS (Type of Service)

The original 8-bit field in the IPv4 header defined in RFC 791, designed to carry service quality information. The ToS field was later reinterpreted: the upper 3 bits became IP Precedence, and the entire 6 upper bits were later redefined as the DSCP field by DiffServ (RFC 2474). The lower 2 bits are used by ECN. Understanding ToS is important when working with legacy network equipment or reading packet captures, where the byte may be labeled 'ToS' but actually contains a DSCP value.

Traffic Policing

A QoS mechanism that measures traffic against a defined rate and immediately drops (or re-marks) packets that exceed the allowed rate, without buffering. Policing enforces strict rate limits at network entry points. In event networks, policing is used to limit untrusted or non-production traffic (e.g., guest internet) to prevent it from consuming uplink bandwidth needed for streaming or remote production, and to enforce per-VLAN or per-device bandwidth caps.

Traffic Shaping

A QoS mechanism that buffers and delays traffic to conform to a specified rate profile, smoothing bursts and preventing downstream devices from being overwhelmed. Unlike policing (which drops excess), shaping holds packets in a buffer and releases them at the governed rate. In event streaming workflows, traffic shaping on upload links ensures that encoder output does not burst above the committed streaming bitrate, preventing CDN or streaming platform ingestion failures caused by momentary overruns.

Transmit Power (Tx Power)

The radio frequency output power of a Wi-Fi access point or client device, measured in dBm or milliwatts. Higher Tx power increases range but also increases co-channel interference with neighboring access points using the same channel. In dense event deployments, reducing AP Tx power (often to 10–17 dBm) and deploying more access points at closer spacing improves per-client performance and reduces interference — a technique known as 'cell shrinking'. Regulatory limits vary by region and frequency band.

Trunk Port

A switch port configured to carry traffic for multiple VLANs simultaneously using 802.1Q tagging. Trunk ports connect switches to other switches, routers, or servers that need to handle multiple VLANs. In event network design, trunk links between core and edge switches carry all production VLANs over a single fiber or copper uplink.

U

UDP (User Datagram Protocol)

A connectionless Layer 4 protocol that sends datagrams without establishing a connection, providing no guarantee of delivery, ordering, or error recovery. UDP offers very low latency overhead and is the transport of choice for real-time audio and video in the event industry. Protocols like RTP, Dante, sACN, and NDI all use UDP for time-sensitive media transport.

UDP Multicast

The combination of UDP's low-overhead transport with IP multicast addressing, used to deliver real-time media streams to multiple receivers simultaneously. This is the foundation for most professional audio-over-IP (e.g., Dante, AES67) and video-over-IP (e.g., ST 2110) protocols in the event industry. Requires proper IGMP snooping configuration on switches.

Unicast MAC Address

A MAC address that identifies a single, unique network interface. The least significant bit of the first byte is 0. Unicast frames are delivered only to the specific device with that MAC address. Most device-to-device communication in event networks uses unicast addressing.

V

VLAN (Virtual Local Area Network)

A logical segmentation of a physical network at Layer 2, grouping devices into separate broadcast domains regardless of their physical location. Defined by IEEE 802.1Q. In event productions, VLANs separate traffic types such as audio, video, lighting control, IT management, and public Wi-Fi, improving security, performance, and troubleshooting clarity.

VLAN Tagging (802.1Q)

The IEEE 802.1Q standard for adding a 4-byte tag to Ethernet frames to identify which VLAN the frame belongs to. Tagged frames carry the VLAN ID (1–4094). Trunk ports between switches carry multiple tagged VLANs. In event network infrastructure, 802.1Q tagging is fundamental for separating multiple traffic streams across shared physical cabling.

VPN (Virtual Private Network)

A technology that creates an encrypted tunnel between two network endpoints over the internet or another untrusted network. VPNs allow remote technicians to securely access event network infrastructure. In event productions, VPNs connect remote locations for distributed streaming workflows, remote production, or secure management access. VPN overhead can affect throughput and latency for real-time media.

VRRP (Virtual Router Redundancy Protocol)

An open standard protocol (RFC 5798) that provides automatic failover for IP gateways by allowing multiple routers to share a single virtual IP address. The master router handles traffic; if it fails, a backup router takes over the virtual IP within seconds. In event network designs with redundant routers or Layer 3 switches, VRRP ensures uninterrupted gateway availability for all production devices.

W

WebSocket

A communication protocol providing full-duplex communication channels over a single TCP connection, typically used in web applications. WebSocket is increasingly used in event control systems, show controllers, and web-based remote monitoring dashboards for real-time bidirectional communication without the overhead of repeated HTTP requests.

WEP (Wired Equivalent Privacy)

The original Wi-Fi encryption standard introduced with IEEE 802.11 in 1997, designed to provide a security level equivalent to wired networks. WEP uses RC4 stream cipher with static 40-bit or 104-bit keys and is fundamentally broken — it can be cracked within minutes using freely available tools. WEP has been deprecated since 2004 and must never be used in any event production network. Its presence on a network is considered a critical security vulnerability.

WFQ (Weighted Fair Queuing)

A queuing algorithm that automatically classifies traffic into flows and allocates bandwidth proportionally, giving lower-bandwidth flows better service relative to large flows. WFQ provides implicit fairness without manual configuration but is computationally expensive at high speeds. It was commonly used in legacy WAN routers. In modern event networks, WFQ has largely been replaced by CBWFQ (Class-Based WFQ), which applies explicit traffic classes rather than per-flow classification.

Wi-Fi Channels and Channel Planning

Wi-Fi spectrum is divided into channels of varying width (20, 40, 80, 160, 320 MHz). In the 2.4 GHz band, only channels 1, 6, and 11 are non-overlapping in most regions. Overlapping channels cause co-channel interference and dramatically reduce throughput. In event deployments, a thorough RF channel plan assigns non-overlapping channels to adjacent access points. Wider channels (80/160 MHz) increase throughput per device but reduce the number of available non-overlapping channels in dense deployments.

Wi-Fi Frequency Bands (2.4 / 5 / 6 GHz)

Wi-Fi standards operate across three main frequency bands. The 2.4 GHz band offers long range but only 3 non-overlapping 20 MHz channels (1, 6, 11) and suffers heavy interference from Bluetooth, microwave ovens, and other Wi-Fi networks. The 5 GHz band provides up to 25 non-overlapping 20 MHz channels with less interference but shorter range. The 6 GHz band (Wi-Fi 6E/7) offers up to 59 non-overlapping 20 MHz channels in pristine, uncongested spectrum. In event environments, 5 GHz and 6 GHz are strongly preferred for production-critical wireless devices.

WLAN Channel Width

The width of the frequency channel used by a Wi-Fi radio, expressed in MHz: 20, 40, 80, 160, or 320 MHz (Wi-Fi 7). Wider channels provide higher throughput per device by encoding more data per transmission, but reduce the number of available non-overlapping channels. In dense event environments with many access points, 20 or 40 MHz channels are often preferred on 2.4 GHz and 5 GHz to allow more non-overlapping cells, while 80 or 160 MHz channels may be used on the 6 GHz band where spectrum is abundant. Channel width is one of the most important tuning parameters in event Wi-Fi design.

WPA (Wi-Fi Protected Access)

A security certification program introduced by the Wi-Fi Alliance in 2003 as an emergency replacement for WEP while 802.11i was being finalized. WPA uses TKIP encryption and the 802.1X authentication framework (or a Pre-Shared Key in personal mode). WPA represented a significant security improvement over WEP but is now considered insecure due to TKIP vulnerabilities. WPA has been deprecated by the Wi-Fi Alliance and should not be used in event networks.

WPA2 (Wi-Fi Protected Access 2)

The security standard introduced in 2004, implementing the full IEEE 802.11i specification. WPA2 mandates AES-CCMP encryption and replaces TKIP. WPA2-Personal uses a Pre-Shared Key (PSK) for authentication; WPA2-Enterprise uses 802.1X with an authentication server (RADIUS). WPA2 remains widely deployed in event networks and is acceptable when strong, unique passphrases are used and PMKID/KRACK vulnerabilities are mitigated through firmware updates. WPA2-Enterprise is recommended for professional production infrastructure.

WPA2/WPA3-Enterprise (802.1X)

The enterprise authentication mode for WPA2 and WPA3, using IEEE 802.1X with an EAP (Extensible Authentication Protocol) method and a RADIUS authentication server. Each user or device has individual credentials, enabling granular access control, per-user session keys, and audit logging. In large event productions, WPA-Enterprise allows different access levels for production staff, broadcast crew, and IT teams on the same wireless infrastructure. Requires a RADIUS server (e.g., FreeRADIUS, Cisco ISE, Windows NPS).

WPA3 (Wi-Fi Protected Access 3)

The current generation of Wi-Fi security protocol, introduced in 2018 as the successor to WPA2. WPA3-Personal uses SAE (Simultaneous Authentication of Equals) instead of PSK, providing stronger protection against offline dictionary attacks. WPA3-Enterprise supports 192-bit cryptographic strength. In event networks carrying sensitive production data, control traffic, or artist communications, WPA3 is strongly recommended for all wireless infrastructure. WPA2 remains acceptable but should use strong, unique passphrases.

WPA3 (Wi-Fi Protected Access 3)

The current Wi-Fi security standard introduced by the Wi-Fi Alliance in 2018. WPA3-Personal replaces PSK with SAE (Simultaneous Authentication of Equals), providing forward secrecy and resistance to offline dictionary attacks. WPA3-Enterprise adds 192-bit cryptographic strength using GCMP-256 and HMAC-SHA-384. WPA3 also introduces Enhanced Open (OWE) for open networks, providing encryption without authentication. For new event network deployments, WPA3 should be the target standard, particularly for networks carrying production-critical data.

WRED (Weighted Random Early Detection)

An active queue management algorithm that begins randomly dropping packets from lower-priority flows before queues completely fill, avoiding the sudden total congestion of tail drop. WRED drops packets probabilistically based on average queue depth and DSCP/IP Precedence class — higher-priority classes have higher drop thresholds and lower drop probabilities. In event networks, WRED on WAN links ensures that best-effort TCP traffic is proactively throttled before it can crowd out real-time audio and video streams.

WRR (Weighted Round Robin)

A queuing discipline that serves multiple queues in a round-robin fashion, but allocates proportional bandwidth based on configured weights. For example, weights of 50:30:20 across three queues guarantee those percentage shares of bandwidth. WRR prevents the starvation problem of Strict Priority by ensuring every queue receives its minimum allocation. In event networks, WRR is used for medium-priority traffic classes such as video streams and control data, while the highest-priority audio class is often handled by a Strict Priority queue above the WRR scheduler.

Leo Künne
Leo Künne
CEO
Contact
+49 172 712 4468
E-Mail
info@cx-networks.com
© 2026 CX-Networks GmbH
Version: 1.6.2
ImprintPrivacy PolicyTerms and Conditions