T-V


Tele*services

The set of multimedia applications, such as teleseminars, telelearning, teleconferencing, and so on.

Tertiary storage

Storage sites where management data are secure and persistent (permanent or semi-permanent).

Threat analysis

A process used to determine which components of the system need to be protected and the types of security risks from which they should be protected.

Threshold

A value for a performance characteristic that is a boundary between two regions of conformance and, when crossed in one or both directions, will generate an action.

Throughput

The realizable capacity of the system or its network elements.

Topological architectural models

Models based on a geographical or topological arrangement; often used as starting points in the development of the network architecture.

Traffic engineering

Overengineering bandwidth in the network to accommodate most short-and long-term traffic fluctuations. Also known as capacity planning.

Traffic flows

See Flows.

Transients

Short-lived events or changes in the behavior of the network.

Trap

A user-configurable threshold for a parameter. Used in network management.

Trend analysis

Using network management data to determine long-term network behaviors, or trends.

Timeliness

A user requirement to be able to access, transfer, or modify information within a tolerable time frame.

Tunneling

Encapsulating information within protocol headers for the purpose of isolating and protecting that information.

Two-part flowspec

A flow specification that describes flows that have stochastic requirements and may include flows that have best-effort requirements.

Unitary flowspec

A flow specification that describes flows that have only best-effort requirements. Also known as a one-part flowspec.

Upstream

Traffic flowing in the direction from the destination to the source.

User requirements

The set of requirements gathered or derived from user input; what is needed by users to successfully accomplish their tasks on the system.

Variable-length subnetting

Subnetting in which multiple subnet masks are used, creating subnets of different sizes.

Virtual private networks

Applying tunneling to create multiple isolated networks across a common infrastructure.




Network Analysis, Architecture and Design
Network Analysis, Architecture and Design, Second Edition (The Morgan Kaufmann Series in Networking)
ISBN: 1558608877
EAN: 2147483647
Year: 2003
Pages: 161

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net