Glossary Archives | A10 Networks
  • |

A10 Blog

/

Glossary

Select a category

  • 5G

  • A10 News

  • Cloud & Networking

  • Cyber Security

  • Events

  • Glossary

  • Network Management

  • Network Security

  • Network Traffic

  • Open Source

  • Technical Articles

Select Author

  • All Authors

  • A10 PSIRT Team

  • A10 Staff

  • Ahmad Nassiri

  • Ahmed Abdelhalim

  • Akshay Mathur

  • Almas Raza

  • Amar Kapadia

  • Andrew Hickey

  • Arshad Khan

  • Babur Khan

  • Bruna Wells

  • Chris White

  • Derek Kang

  • Dhrupad Trivedi

  • Donald Shin

  • Gennady Dosovitsky

  • Geoff Blaine

  • George Nikaido

  • Gunter Reiss

  • Jeffrey Hughes

  • Jessica Dimaro

  • Jian Liu

  • Jim Frey

  • Kamal Anand

  • Karin Gilles

  • Ken Ludeman

  • Konstantin Dunaev

  • Leah McLean

  • Lee Chen

  • Michael Wheeler

  • Mike Thompson

  • Paul Harms

  • Paul Nicholson

  • Ravi Raj Bhat

  • Rex Chang

  • Rich Groves

  • Robert Keith

  • Sanjai Gangadharan

  • Saurabh Sureka

  • Shingo Takagi

  • Siddhartha Aggarwal

  • Simon Jackson

  • Steve Hotz

  • Subeh Sharma

  • Sudarsan Raghavan

  • Takahiro Mitsuhata

  • Tarun Aggrawal

  • Terry Young

  • Tony Griffen

  • Tracy Schriver

  • Wendi Wolfgram

  • Yasir Liaqatullah

August 11, 2020

What is Carrier-grade NAT (CGN/CGNAT)?

Way back in the early days of the internet (the 1980s) every connected computer was intended to have its own unique public IP address. IP addressing was originally defined by four octets—four groups of eight bits, a standard called IPv4—which resulted in over four billion unique values (actually, 4,294,967,296), so at the time it seemed…

August 3, 2020

Key differences Between TLS 1.2 and TLS 1.3

Transport Layer Security (TLS) is a foundational technology for online privacy. As a cryptographic protocol, Transport Layer Security encrypts data and authenticates connections when moving data over the internet via HTTP—an extension of the protocol known as HTTPS (Hyper Text Transfer Protocol Secure). When a user visits a website, their browser checks for a TLS…

July 14, 2020

What is a DDoS Attack (Distributed Denial of Service Attack)?

DDoS Attack Definition A Distributed Denial of Service attack, otherwise called a DDoS attack, is an assault on an online service that is, unfortunately, remarkably easy to mount and, if your cybersecurity team doesn’t have effective DDoS protection tools, these attacks are hard to counter. DDoS attacks are, at least in concept, simple: By sending…

July 10, 2020

What is Global Server Load Balancing (GSLB)?

For companies to deliver the best possible experience to users, they need to ensure always-on connectivity and reliable performance for business applications whenever and wherever they’re accessed. Global server load balancing (GSLB) helps you meet this requirement by providing load balancing, site failover, and web traffic management across multiple data centers and/or clouds. A core…

June 30, 2020

How do Layer 4 Load Balancing and Layer 7 Load Balancing Differ?

Load balancing is one of the most important functions of an application delivery controller (ADC), optimally distributing network traffic across servers to provide the best possible application performance and availability. There are a few different ways this can be done; you’ll see references to layer 4 load balancing, layer 7 load balancing, and even L4…

June 17, 2020

What is High Availability Load Balancing?

Today’s enterprises are more dependent on their networks than ever. Trends like mobile broadband, multi-cloud and hybrid cloud, virtualization, remote work, and bring your own device (BYOD) enable employees to be productive from almost anywhere—as long as they have reliable connectivity. That puts tremendous pressure on IT to ensure high availability for mission-critical applications such…

April 26, 2019

What is Kubernetes Ingress?

This article is a brief overview of the Kubernetes ingress architecture including the Kubernetes services and ingress controllers. Ingress is a Kubernetes core concept responsible for managing ingress network traffic between hosted application services and external clients. Ingress infrastructures have specific technical and business requirements such as high availability, scalability, security, performance or specific application…

March 27, 2019

5G Key Technologies

This article provides an overview of several of the most important new technologies developed for the 5G Networks. To meet the 5G design vision, service and performance requirements, new technologies were required; some are extensions of 4G and, some are developed explicitly for 5G. Related articles: What is 5G? 5G Network Reliability Explained 5G Energy…