System or component response time, a measure of delay that incorporates device and application processing, taking into account the time to complete a task.
A boundary between conforming and nonconforming regions; is taken as an upper or lower limit for a performance characteristic.
In the distributed-computing flow model, when there may be little to no transfer of information between computing devices.
An indicator that the service request or requirement's performance characteristics are less than a performance threshold determined for that network.
A statistical measure of the time to restore the system to fully operational status after it has experienced a fault.
Tagging an IP packet with a priority level, as part of traffic conditioning.
Hardware and software that help a network to achieve each function.
Additional information about the collected data, such as references to the data types, time stamps of when the data were generated, and any indications that these data reference any other data.
Measuring the temporal performance characteristics of a traffic flow, as part of traffic conditioning.
Determining which SNMP MIBs to use and apply, as well as which variables in each MIB are appropriate, for your network.
Applications that require predictable or high reliability.
Obtaining values for end-to-end, per-link, and per-element network management characteristics.
A flow specification that describes flows that have guaranteed requirements; may include flows that have stochastic and/or best-effort requirements.
The IP address mask that coincides with a class boundary.
The mapping of IP addresses from one realm to another. Typically this is between public and private address space.
Studying network components, its inputs and outputs, to understand network behavior under variable situations.
Developing a high-level end-to-end structure for the network. This includes the relationships between major architectural components of the network, such as security, network management, addressing, and routing.
Details (physically) the reference network architecture, evaluating and choosing technologies for each area of the network, as well as developing strategies to connect these technologies across the network.
An individual component of the network that participates at one or more of the protocol layers.
Everything that is external to the network, such as the physical or business environments. Can also include users, applications, and devices, although they are usually considered with the network to be part of the system.
Providing functions to control, plan, allocate, deploy, co-ordinate, and monitor network resources.
Protecting the external interfaces between your network and external networks.
An estimate of how long it takes for a signal to cross a physical medium or link.
A subset of network security, focusing on protection of networks and their services from unauthorized access or disclosure.
Requests for capabilities in the network, usually in terms of performance and function, that are necessary for the success of that network.
The protection of networks and their services from unauthorized access, modification, destruction, or disclosure. It provides assurance that the network performs its critical functions correctly and that there are no harmful side effects.
Levels of performance and function in the network.
Network technologies that do not inherently have broadcast support.
See also Broadcast technologies.
Traffic that is outside of performance boundaries, as determined by metering (traffic conditioning).
Applications with various end-to-end delay requirements, at times more stringent (in terms of the amount of delay) than real-time applications, but the destination will wait (within reason) until the information is received.
A management interface that is oriented toward higher-level (thus up or northbound) management functions. This term is commonly used for the interface from network management to service or business management.