Search neutrality

The term “search neutrality” refers to the principle that all online search engines should treat all websites equally, without regard to their content, purpose, or any other factor. This principle is based on the belief that all websites should have an equal opportunity to be found by users of online search engines, and that no … Read more

BOINC (Berkeley Open Infrastructure for Network Computing)

BOINC is a software platform for distributed computing, which enables volunteers to donate idle computing resources to scientific projects in a variety of disciplines, including astronomy, biology, climate modeling, medicine, and many others. BOINC was originally developed to support the SETI@home project, which uses volunteers’ spare computing power to search for extraterrestrial life. However, the … Read more

IP address management (IPAM)

The term “IP address management” (IPAM) refers to the process of planning, assigning, and maintaining IP addresses and other associated network infrastructure components. IPAM involves the use of software tools to automate the tasks of network administration, including the assignment of IP addresses to devices on the network. IPAM tools are used to monitor and … Read more

Quick Start Glossary: WAN acceleration

WAN acceleration is the process of using a variety of techniques to improve the performance of Wide Area Network (WAN) connections. WAN acceleration can be used to improve the throughput, latency, and reliability of WAN connections. WAN acceleration is typically used to improve the performance of applications that are sensitive to network latency, such as … Read more

VXLAN (Virtual Extensible LAN)

VXLAN is a Layer 2 overlay network protocol that creates a virtual network on top of an existing physical network. VXLAN uses a UDP-based encapsulation scheme to encapsulate Layer 2 Ethernet frames in Layer 3 UDP packets. This allows VXLAN to be used to create virtual networks that span multiple physical networks. VXLAN was originally … Read more

Leaky bucket algorithm

A leaky bucket algorithm is a means of controlling the rate of data transfer in a network. It does this by regulating the amount of data that can be sent in a given time period. The algorithm works by allowing a certain amount of data to be sent in a given time period, and then … Read more

Multipath I/O (MPIO)

Multipath I/O (MPIO) is a computer networking term for the use of multiple physical paths to connect a server to a storage device. MPIO allows for increased throughput and redundancy in the event of a path failure. In a traditional storage configuration, a server is connected to a storage device via a single path. If … Read more

Resource-oriented architecture (ROA)

ROA is a type of software architecture that is based on the principle of resources being the primary unit of interaction. This means that instead of having a traditional model where data is the primary focus, ROA focuses on resources and how they can be accessed and used. This approach is often used in web-based … Read more

Burstiness

The term “Burstiness” refers to the tendency of traffic to arrive in short bursts or bursts of packets. This can be due to a variety of factors, but is often seen in network traffic due to the way that many applications work. For example, when a user sends an email, they will typically type out … Read more