Glossary

Index | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | 0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9

6rd

6rd is an IPv6 migration technology, where the access network of the service provider is running IPv4.

Read more

Active Directory Federation Services (ADFS)

Active Directory Federation Services (ADFS) allows the sharing of identity authentication between two trusted partners beyond the boundaries of their respective Active Directory (AD) forests.

Read more

aFleX

aFleX is a scripting tool that is built into the Thunder and AX Series of New Generation Server Load Balancers.

Read more

Application Acceleration

Application Acceleration consists of methods that can be used to improve the performance of applications over networks to ensure that application data is delivered as quickly as possible.

Read more

Application Bandwidth Management

Application Bandwidth Management consists of a set of Quality of Service (QoS) tools used to handle and prioritize data traffic by application type.

Read more

Application Delivery Controllers

Application Delivery Controllers (ADCs) are devices that are typically set in front of a web farm within a datacenter.

Read more

Bandwidth

Bandwidth refers to the width of a communications channel, and it may be helpful to envision bandwidth as a hose or pipe that carries data communications instead of water.

Read more

Bandwidth Management

Bandwidth management is the practice of effectively allocating the available resources within an enterprise's communications channel in order to optimize the speed of mission-critical communications, while reducing bandwidth allocated to applications that are less critical or less sensitive to time delays.

Read more

Carrier Grade NAT (CGN, CG-NAT, CGNAT)

Carrier Grade NAT, (CGN, CGNAT, CG-NAT) is also known as Large Scale NAT (LSN). Like regular Network Address Translation (NAT), it shares an outside IP address among multiple inside local (private) IP addresses. This feature is utilized to alleviate the IPv4 address exhaustion.

Read more

DS-Lite

DS-Lite is an IPv6 migration technology, where the access network of the service provider is running IPv6.

Read more

Inter-Process Communication (IPC)

Inter-Process Communication (IPC) is a messaging sub-system that can enable data exchange between processors. Because IPC creates additional CPU overhead, it can result in delayed response times, slower software performance, and inaccurate real-time data per CPU.

Read more

IPv4 Address Exhaustion

IPv4 address exhaustion is the depletion of the pool of unallocated Internet Protocol Version 4 (IPv4) addresses.

Read more

IPv6

IPv6 (Internet Protocol version 6) is a revision of the Internet Protocol (IP) developed by the Internet Engineering Task Force (IETF).

Read more

IPv6 Migration

Since IPv4 and IPv6 are incompatible, both protocols have to be supported simultaneously in order to provide a smooth migration and seamless user experience.

Read more

Microsoft Exchange

Microsoft Exchange is an email server, calendar host and contact manager, with built-in protection against spam and viruses. Exchange enables users throughout an organization to access email, VM, calendars, and contacts from a wide variety of devices and from any location.

Read more

Microsoft Internet Information Services (IIS)

Microsoft Internet Information Services (IIS) is a server application for use with Microsoft Windows Servers. It can be used to host a wide variety of services, such as media streaming or web applications. IIS support includes HTTP, HTTPS, FTP, FTPS, SMTP and NNTP protocols.

Read more

Microsoft Lync Server

Microsoft Lync Server is the successor to Microsoft Office Communications Server (OCS), providing a single interface that unites enterprise-ready voice communications, IM, collaboration, and audio/video web conferencing into a richer, more contextual offering for users.

Read more

Microsoft SharePoint

Microsoft SharePoint is a web-based enterprise application for document management and collaboration, utilizing the HTTP and HTTPS protocols.

Read more

Microsoft Unified Access Gateway (UAG)

Microsoft Unified Access Gateway (UAG) 2010 is part of the Microsoft Forefront security product line.

Read more

Microsoft Windows Server Terminal Services

Microsoft Terminal Services (also called Remote Desktop Services) allows remote control of applications over a network.

Read more

NAT64

NAT64 is a technology where IPv6-only clients can still access legacy IPv4-only content.

Read more

Operating System (OS)

An Operating System (OS) is the software program that runs on a computer or mobile device and handles the most fundamental tasks. Examples of common operating systems include Microsoft Windows, Linux, and UNIX.

Read more

RAM Caching

RAM caching optimizes network transactions for the user, network and web servers. Frequently requested objects from web servers are stored locally in RAM on the Application Delivery Controller (ADC).

Read more

Server Load Balancer

server load balancer is a hardware or virtual software appliance that distributes the demand for server and application processing power across an array of servers, ensuring application availability, application scaling and reliability via comprehensive health monitoring that removes unresponsive or underperforming server application from the load balancing scenario.

Read more

SIP Load Balancing

SIP load balancing scales and optimizes a SIP infrastructure. SIP registration and SIP proxy traffic can be handled in separate service groups, whose servers can be monitored with separate application-layer SIP health checks for registration or non-registration traffic.

Read more

SLB-PT

SLB-PT (Server Load Balancing - Protocol Translation) is a method of connecting an IPv4 server through an ADC and make it available to the IPv6 public Internet, or vice versa.

Read more

SSL Offloading

Secure Socket Layer (SSL) is a commonly-used protocol that helps to ensure the security of HTTP traffic traveling across the Internet. SSL relies on public- and private-key encryption to encrypt communications between the client and server so that messages are sent safely across the network.

Read more

Traffic Monitoring

Traffic monitoring, also known as network monitoring, is the method of studying the incoming and outgoing traffic on a computer network via specialized hardware and/or software. 

Read more

Traffic Shaping

Traffic shaping, also known as packet shaping, Quality of Service (QoS) or bandwidth management, is the manipulation and  prioritization of network traffic to reduce the impact of heavy users or machines from effecting other users.

Read more