A point in a computer network through which all or most of the traffic in a network flows. Such points are vulnerable to both unauthorized access and hardware failure. One of the main strategies of network designers is to minimize or eliminate the number of choke points.