Network Analysis, Architecture and Design, Second Edition (The Morgan Kaufmann Series in Networking)
- Tele*services
-
The set of multimedia applications, such as teleseminars, telelearning, teleconferencing, and so on.
- Tertiary storage
-
Storage sites where management data are secure and persistent (permanent or semi-permanent).
- Threat analysis
-
A process used to determine which components of the system need to be protected and the types of security risks from which they should be protected.
- Threshold
-
A value for a performance characteristic that is a boundary between two regions of conformance and, when crossed in one or both directions, will generate an action.
- Throughput
-
The realizable capacity of the system or its network elements.
- Topological architectural models
-
Models based on a geographical or topological arrangement; often used as starting points in the development of the network architecture.
- Traffic engineering
-
Overengineering bandwidth in the network to accommodate most short-and long-term traffic fluctuations. Also known as capacity planning.
- Traffic flows
-
See Flows.
- Transients
-
Short-lived events or changes in the behavior of the network.
- Trap
-
A user-configurable threshold for a parameter. Used in network management.
- Trend analysis
-
Using network management data to determine long-term network behaviors, or trends.
- Timeliness
-
A user requirement to be able to access, transfer, or modify information within a tolerable time frame.
- Tunneling
-
Encapsulating information within protocol headers for the purpose of isolating and protecting that information.
- Two-part flowspec
-
A flow specification that describes flows that have stochastic requirements and may include flows that have best-effort requirements.
- Unitary flowspec
-
A flow specification that describes flows that have only best-effort requirements. Also known as a one-part flowspec.
- Upstream
-
Traffic flowing in the direction from the destination to the source.
- User requirements
-
The set of requirements gathered or derived from user input; what is needed by users to successfully accomplish their tasks on the system.
- Variable-length subnetting
-
Subnetting in which multiple subnet masks are used, creating subnets of different sizes.
- Virtual private networks
-
Applying tunneling to create multiple isolated networks across a common infrastructure.
Категории