Index

  • 3GPP (See also Third Generation Partnerships)
  • 3GPP2 (See also Third Generation Partnerships)
  • ABAC, See Attribute-Based Access Control
  • Abstract Syntax Notation (ASN)
  • Access Control List (ACL)
  • Access Control Markup Language (ACML)
  • Access Control Matrix (ACM)
  • accounting management
  • ACL, See Access Control List
  • admission control
  • Advanced Encryption Standard (AES)
  • Advanced Message Queuing Protocol (AMQP)
  • Advanced Technology Attachment (ATA)
    • Serial ATA (SATA)
  • AES, See Advanced Encryption Standard
  • alarm
  • ALG, See Application-Level Gateway
  • American National Standards Institute (ANSI)
  • American Standard Code for Information Interchange (ASCII)
  • AMQP, See Advanced Message Queuing Protocol
  • ANSI (See American National Standards Institute)
  • anycast
  • API, See Applications Programmer's Interface
  • application gateways
  • Application-Level Gateway (ALG)
  • application monitoring
  • Application Programmer's Interface (API)
  • ARPANET
  • AS, See Autonomous Systems
  • ASCII, See American Standard Code for Information Interchange
  • ASN, See Abstract Syntax Notation
  • ASN.1
  • Asynchronous Transfer Mode (ATM)
  • ATA, See Advanced Technology Attachment
  • ATM, See Asynchronous Transfer Mode
  • Attribute-Based Access Control (ABAC)
  • auto-deployment
  • auto-healing
  • Autonomous System Number
  • Autonomous Systems (AS)
  • auto-scaling
  • Basic Input/Output System (BIOS)
  • bearer token
  • Bell–LaPadula model
  • Berkeley Internet Domain Name (BIND)
  • BGP, See Border Gateway Protocol
  • BIND, See Berkeley Internet Domain Name
  • BIOS, See Basic Input/Output System
  • blade servers
  • Border Gateway Protocol
  • CA, See Certification Authority
  • cache poisoning
  • capability list
  • Carrier-Grade NAT (CG NAT)
  • CDN, See Content Delivery Network
  • Ceilometer (OpenStack)
  • central agent
  • Central Processing Unit (CPU)
    • CPU pinning
  • Certification Authority (CA)
  • CG NAT, See Carrier-Grade NAT
  • chain of trust
  • Challenge Handshake Authentication Protocol (CHAP)
  • CHAP, See above
  • Chef
  • CIDR, See Classless Inter-Domain Routing
  • Cinder
  • Classless Inter-Domain Routing
  • Common Management Information Protocol (CMIP)
  • Common Off-The-Shelf
  • Common Open Policy Service (COPS)
  • Community Cloud
  • computation migration
  • Compute (OpenStack)
    • agent
    • controller
    • node
  • computing as a public utility
  • configuration management
  • consistent hashing
  • Content Delivery Networking (CDN)
  • Controller Node
  • COPS, See Common Open Policy Service
  • COTS, See Common-off-the-shelf
  • CPU, See Central Processing Unit
  • CRC
  • credentials
  • Cryptographic Message Syntax
  • Cyclical redundancy check
  • DAS, See Direct-Attached Storage
  • data migration
  • database-as-a-service
  • DDT, See Domain Definition Table
  • deep packet inspection
  • delegation
  • demilitarized zone
  • Denial of Service (Dos)
  • device controller
  • Differentiated Services (diffserv)
  • Differentiated Services Codepoint
  • diffserv, See Differentiated services
  • Dynamic Random-Access Memory (DRAM)
  • Direct Memory Access (DMA)
  • Direct-Attached Storage (DAS)
  • Discretionary Access Control
  • Distributed Management Task Force (DMTF)
  • Distributed operating systems
  • DMA, See Direct Memory Access
  • DMTF, See Distributed Management Task Force
  • DMZ, See demilitarized zone
  • DNS, See Domain Name System
  • DNSSEC, See Domain Name System Security
  • Domain and Type Enforcement (DTE)
  • Domain Definition Table (DDT)
  • domain name
  • Domain Name System
  • Domain Name System Security
  • DoS, See Denial of Service
  • DRAM, See Dynamic Random-Access Memory
  • DTE, See Domain and Type Enforcement
  • Dynamic Random Access Memory
  • EBCDIC, See Extended Binary Coded Decimal Interchange
  • End-of-Row (EOR)
  • EoR, See End-of-Row
  • EPC, See Evolved Packet Core
  • ETSI, See European Telecommunications Standardization Institute
  • eui, See Extensible Unique Identifier
  • European Telecommunications Standardization Institute (ETSI)
  • Evolved Packet Core (EPC)
  • Extended Binary Coded Decimal Interchange Code (EBCDIC)
  • Extensible Access Control Markup Language (XACML)
  • Extensible Markup Language (XML)
  • Extensible Unique Identifier (eui)
  • External Data Representation (XDR)
  • fault management
  • Fault, Configuration, Accounting, Performance, and Security (FCAPS)
  • FC, See Fibre Channel
  • FCAPS, See Fault, Configuration, Accounting, Performance, and Security
  • FCoE, See Fibre Channel over Ethernet Protocol
  • FCoE Initialization Protocol
  • FCP, See Fibre Channel Protocol
  • Fibre Channel (FC)
    • Protocol
    • over Ethernet Protocol
    • over Ethernet Initialization Protocol (FIP)
  • File transfer
  • File Transfer Protocol (FTP)
  • fingerprint
  • FIP, See Fibre Channel over Ethernet Initialization Protocol
  • firewalls
  • floating IP address
  • ForCES, See Forwarding and Control Element Separation
  • Forwarding and Control Element Separation
  • FTP, See File Transfer Protocol
  • GENI, See Global Environment for Network Innovations
  • Glance (OpenStack)
  • Global Environment for Network Innovations (GENI)
  • Hardware Security Module (HSM)
  • HBA, See Host Bus Adapter
  • HDLC, See High-Level Data Link Control
  • Heat (OpenStack)
  • high-availability cluster
  • High-Level Data Link Control (HDLC)
  • HIPAA, See US Health Insurance Portability and Accountability Act
  • HMAC
  • Host Bus Adaptor (HBA)
  • HSM, See Hardware Security Module
  • HTML, See Hyper-Text Mark-up Language
  • HTTP, See Hyper-Text Transfer Protocol
  • Hybrid Cloud
  • hypermedia
  • hypertext
  • Hyper-Text Transfer Protocol (HTTP)
    • Post
    • Redirect
  • Hyper-Text Mark-up Language (HTML)
  • hypervisor
  • I/O MMU, See Memory Management Unit
  • IaaS, See Infrastructure-as-a-Service
  • IAM, See Identity and Access Management
  • ICANN, See Internet Corporation for Assigned Names and Numbers
  • ICE, See Interactive Connectivity Establishment
  • Identity and Access Management (IAM)
  • Identity Federation
  • Identity Provider
  • Identity service
  • IdP, See Identity Provider
  • IETF, See Internet Engineering Task Force
  • IFFOR, See International Foundation For Online Responsibility
  • IMS, See IP Multimedia Subsystem
  • IN, See Intelligent Network
  • INCITS, See InterNational Committee on Information Technology Standards
  • Infrastructure-as-a-Service
  • Integrated Services Digital Network (ISDN)
  • Intelligent Network (IN)
  • Interactive Connectivity Establishment (ICE)
  • InterNational Committee on Information Technology Standards (INCITS)
  • International Foundation For Online Responsibility (IFOR)
  • International Organization for Standardization (ISO)
  • International Telecommunication Union—Telecommunication Standardization Sector (ITU-T)
  • Internet Corporation for Assigned Names and Numbers (ICANN)
  • Internet Engineering Task Force (IETF)
  • Internet Protocol (IP)
    • version 4 of (IPv6)
    • version 6 of (IPv6)
  • Internet SCSI
    • Qualified Name (iqn)
    • See also Small Computer System Interface Internet Systems Consortium (ISC)
  • Internet Worm attack
  • introspection
  • IP, See Internet Protocol
  • IP Multimedia Subsystem (IMS)
  • IP Security Protocol (IPsec)
  • IPsec, See above
  • iqn, See iSCSI Qualified Name
  • iSCSI, See Internet SCSI
  • ISDN, See Integrated Services Digital Network
  • ISO, See International Organization for Standardization
  • ITU-T, See International Telecommunication Union—Telecommunication Standardization
  • JavaScript Object Notation (JSON)
    • Web Token (JWT)
  • Journaling
  • JSON, See JavaScript Object Notation
  • JWT, See JavaScript Object Notation (JSON) Web Token
  • Kerberos
  • kernel, operating system's
  • Kernel-based Virtual Machine (KVM) hypervisor
  • key escrow
  • keyed-hash message authentication code
  • Keyed-Hashing for Message Authentication
  • Keystone (OpenStack)
  • KVM, See Kernel-based Virtual Machine
  • Label-Switching Router
  • Large-Scale NAT
  • leaky-bucket model
  • lifecycle services
  • load balancer
  • load balancing
  • load-balancing-as-a-service
  • low-watermark principle
  • LS NAT, See Large-Scale NAT
  • LSR, See Label-Switching Router
  • MAC, See Mandatory Access Control
  • Mandatory Access Control (MAC)
  • Memcached
  • Memory Management Unit (MMU)
    • I/O MMU
  • microkernel, (also see kernel)
  • midbox
  • MMU, See Memory Management Unit
  • MPLS, See Mutli-Protocol Label Switching
  • multicast
  • Multics
  • multi-factor authentication
  • multi-homing
  • Multi-Protocol Label Switching
  • NAPT, See Network Address and Port Translation
  • NAS, See Network-Attached Storage
  • NAT, See Network Address Translation
  • National Institute of Standards and Technology (NIST)
  • NETCONF, See Network Configuration
  • Network Address and Port Translation
  • Network Address Translation (NAT)
  • Network Configuration (NETCONF)
  • Network Controller
  • Network Functions Virtualization (NFV)
  • Network Interface Controller (NIC)
  • network management
  • Network operating systems
  • Network-Attached Storage (NAS)
  • Networking Appliances
  • Neutron (OpenStack)
  • Next-Generation telecommunications Network (NGN)
  • NFV, See Network Function Virtualization
  • NGN, See Next-Generation telecommunications Network
  • NIC, See Network Interface Card
  • NIST, See National Institute of Standards and Technology
  • NoHype (Princeton University hypervisor project)
  • nonce
  • non-virtualizable instructions
  • Nova
  • Nova Conductor
  • OASIS, See Organization for the Advancement of Structured Information Standards
  • OAuth, See Open Authorization protocol
  • Object Management Group
  • object-oriented programming
  • OMG, See Object Management Group
  • onboarding
  • ONF, See Open Networking Foundation
  • Open Authorization protocol (OAuth)
  • Open Networking Foundation (ONF)
  • Open Systems Interconnection (OSI)
  • OpenFlow
  • OpenID
  • OpenID Connect
  • OpenStack. (See also Ceilometer, compute, Glance, Heat, Keystone, and Neutron)
  • OpenTOSCA
  • See also Topology and Orchestration Specification for Cloud Applications
  • Operations and Management (OA&M)
  • Operations Support Systems
  • Orchestration
  • Organization for the Advancement of Structured Information Standards
  • OSI, See Open Systems Interconnection
  • OSS, See Operations Support Systems
  • OTT, See Over-the-Top
  • Over-the-Top
  • PaaS, See Platform-as-a-Service
  • PAP, See Policy Administration Point
  • paravirtualization
  • password
  • P-CSCF, See Proxy Call Session Control Function
  • PDP, See Policy Decision Point
  • Per-Hop-Behavior (PHB)
  • PHB, See Per-Hop-Behavior
  • PKI, See Public Key Infrastructure
  • PKI certificate
  • Platform-as-a-Service (PaaS)
  • Point-to-Point Protocol PPP
  • Policy administration point (PAP)
  • Policy Decision Point (PDP)
  • Policy repository
  • policy-based management
  • PPP, See Point-to-Point Protocol
  • privacy
  • Private Cloud
  • program control
  • proxy
  • Proxy Call Session Control Function (P-CSCF)
  • PSDN, See Public Service Data Network
  • PSTN, See Public Switched Telecommunications Network
  • Public Cloud
  • Public Key Infrastructure (PKI)
  • Public Service Data Network (PSDN)
  • Public Switched Telecommunications Network (PSTN)
  • public-key cryptography
  • Punicode
  • Puppet
  • QEMU, See Quick EMUlator
  • QoS, See Quality of Service
  • Quality of Service
  • Quick EMUlator
  • RACF, See Resource and Admission Control Functions
  • rack unit
  • rack-mounted servers
  • RAID, See Redundant Arrays of Independent Disks
  • RAM, See Random Access Memory
  • RAMCloud
  • Random Access Memory
  • RBAC, See Role-Based Access Control
  • RDMA, See Remote Direct Memory Access
  • Real-Time Communications in Web Browser (RTCWeb)
  • recipes
  • recursive name server
  • Redundant Arrays of Independent Disks (RAID)
  • Regional Internet Registry (RIR)
  • relying party
  • Remote Direct Memory Access (RDMA)
  • Remote Procedure Call (RPC)
  • rendez-vous relay
  • Resource and Admission Control Functions (RACF)
  • resource locator
  • Representation State Transfer (REST) methodology
  • API
  • RIR, See Regional Internet Registry
  • Role-Based Access Control (RBAC)
  • rootkit
  • RPC, See Remote Procedure Call
  • RSA algorithm
  • SaaS, See Software-as-a-Service
  • SAML, See Security Assertion Markup Language
  • SAN, See Storage Area Network
  • SAS, See Serial Attached SCSI
  • SATA, See Adavanced Technology Attachment, Serial
  • SCSI, See Small Computer Systems Interface
  • SCTP, See Stream Control Transmission Protocol
  • SDN, See Software-Defined Networks
  • SDP, See Service Description Protocol
  • Secure Shell (SSH)
  • Secure Socket Layer (SSL)
  • security assertion
  • Security Assertion Markup Language (SAML)
  • security token
  • SELinux
  • Serial ATA
  • Serial Attached SCSI
  • service discovery
  • Service-Level Agreement (SLA)
  • Service-Level Objectives (SLOs)
  • Service Location Protocol
  • Service-Oriented Architecture (SOA)
  • Session Description Protocol (SDP)
  • Session Initiation Protocol (SIP)
  • Session Traversal Utilities for NAT (STUN)
  • Shadow IT
  • shared storage model
  • simple integrity property
  • Simple Mail Transfer Protocol (SMTP)
  • Simple Network Management Protocol (SNMP)
  • Simple Traversal of User Datagram Protocol (UDP) Through Network Address Translators (NATs)
  • single sign-on
  • SIP, See Session Initiation Protocol
  • SLA, See Service-Level Agreement
  • SLOs, See Service-Level Objectives
  • Small Computer System Interface (SCSI)
  • smart card
  • SMTP, See Simple Mail Transfer Protocol
  • smurf attack
  • SNA, See System Network Architecture
  • SNIA, See Storage Networking Industry Association
  • SNMP, See Simple Network Management Protocol
  • SOA, See Service-Oriented Architecture
  • SoftRouter
  • SoftSwitch
  • Software-as-a-Service (SaaS)
  • Software Defined Networks (SDN)
  • solid-state storage
  • SSH, See Secure Shell
  • SSL, See Secure Socket Layer
  • Static Random Access Memory
  • storage
  • Storage Area Network (SAN)
  • Storage Networking Industry Association (SNIA)
  • storage virtualization
  • Stream Control Transmission Protocol (SCTP)
  • STUN, See Session Traversal Utilities for NAT
  • SubVirt
  • sVirt
  • Swift
  • symmetric cryptography
  • SYN Cookies
  • SYN-caching
  • Systems Network Architecture (SNA)
  • T1
  • TCB, See Trusted Computing Base
  • TCP, See Transmission Control Protocol
  • Telecommunications Information Networking Architecture Consortium (TINA-C)
  • Telecommunications Management Network (TMN)
  • Telemanagement Forum (TMF)
  • telemetry agents
  • template
  • Third-Generation Partnerships
  • TINA-C, See Telecommunications Information Networking Architecture Consortium
  • TLD, See Top-Level Domain
  • TLS, See Transport Layer Security
  • TMF, See Telemanagement Forum
  • TMN, See Telecommunications Management Network
  • token bucket model
  • token service
  • Top-Level Domain (TLD)
  • Top-of-Rack (ToR)
  • Topology and Orchestration Specification for Cloud Applications (TOSCA)
  • ToR, See Top-of-Rack
  • TOSCA, See Topology and Orchestration Specification for Cloud Applications
  • transaction systems
  • transfer syntax
  • Transmission Control Protocol (TCP)
  • Transport Layer Security (TLS)
  • Traversal Using Relay NAT (TURN)
  • Trusted Computing Base (TCB)
  • trustee
  • trustor
  • TURN, See Traversal Using Relay NAT
  • type enforcement
  • UDP, See User Datagram Protocol
  • unicast
  • Unicode
  • Universal Resource Identifier
  • Universal Resource Locator (URL)
  • Universal Resource Name (URN)
  • URI, See Universal Resource Identifier
  • URL, See Universal Resource Locator
  • URN, See Universal Resource Name
  • US Health Insurance Portability and Accountability Act
  • User Datagram Protocol (UDP)
  • VFS, See Virtual File System
  • virtual circuit
  • Virtual File System
  • Virtual Internet SCSI
  • Virtual Local Area Network (VLAN)
  • Virtual Machine Monitor
  • See also hypervisor
  • Virtual Machine-Based Rootkit (VMBR)
  • virtual private Cloud
  • Virtual Private Network
  • VirtualBox
  • VLAN, See Virtual Local Area Network
  • VMBR, See Virtual Machine-Based Rootkit
  • Volume Controller
  • VPN
  • W3C, See World-Wide Web Consortium
  • Web Services Description Language (WSDN)
  • WebSocket
  • World Wide Name
  • World-Wide Web Consortium
  • WSDL, See Web Services Description Language
  • WWN
  • X.25
  • X.509 certificates
  • XACML, See Extensible Access Control Markup Language
  • XDR, See External Data Representation
  • Xen (hypervisor)
  • XML, See Extensible Markup Language
  • YANG
  • μ-kernel, See microkernel
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset