Amazon Silk

Amazon Silk is a web browser developed by Amazon. It was first released for Amazon’s Kindle Fire tablet on September 28, 2011. The browser uses Amazon’s own servers to pre-process and compress web pages before sending them to the device, thereby reducing data usage and loading times. Silk is based on the open-source Chromium project … Read more

Packet coalescing

Packet coalescing is the process of combining multiple small packets into a single larger packet before sending them over a network. This can help to improve network efficiency and performance by reducing the number of packets that need to be sent, and can also help to reduce the amount of overhead associated with each packet. … Read more

Access network

An access network is a telecommunications network which connects subscribers to their service provider. It is generally used in reference to the network infrastructure which connects individual homes and businesses to a telephone or data network. An access network typically includes a central office, which is a physical location where subscriber lines terminate and connect … Read more

Private IP address

A private IP address is a non-routable address that is used for internal networks. Private IP addresses are usually assigned to devices that are not intended to be accessible from the Internet, such as printers and file servers. Private IP addresses are usually assigned using one of three private IP address ranges: 10.0.0.0 – 10.255.255.255 … Read more

Quick Start Glossary: WAN acceleration

WAN acceleration is the process of using a variety of techniques to improve the performance of Wide Area Network (WAN) connections. WAN acceleration can be used to improve the throughput, latency, and reliability of WAN connections. WAN acceleration is typically used to improve the performance of applications that are sensitive to network latency, such as … Read more

40 Gigabit Ethernet (40GbE)

40 Gigabit Ethernet (40GbE) is a standard for Ethernet networking that supports data transfer speeds of up to 40 gigabits per second (Gbps). It was introduced in 2010 and is the successor to the 10 Gigabit Ethernet (10GbE) standard. 40GbE is commonly used in high-performance computing (HPC) and data center environments, where its high data … Read more

Leaky bucket algorithm

A leaky bucket algorithm is a means of controlling the rate of data transfer in a network. It does this by regulating the amount of data that can be sent in a given time period. The algorithm works by allowing a certain amount of data to be sent in a given time period, and then … Read more

Search neutrality

The term “search neutrality” refers to the principle that all online search engines should treat all websites equally, without regard to their content, purpose, or any other factor. This principle is based on the belief that all websites should have an equal opportunity to be found by users of online search engines, and that no … Read more

IP address management (IPAM)

The term “IP address management” (IPAM) refers to the process of planning, assigning, and maintaining IP addresses and other associated network infrastructure components. IPAM involves the use of software tools to automate the tasks of network administration, including the assignment of IP addresses to devices on the network. IPAM tools are used to monitor and … Read more

Burstiness

The term “Burstiness” refers to the tendency of traffic to arrive in short bursts or bursts of packets. This can be due to a variety of factors, but is often seen in network traffic due to the way that many applications work. For example, when a user sends an email, they will typically type out … Read more