The set of multimedia applications, such as teleseminars, telelearning, teleconferencing, and so on.
Storage sites where management data are secure and persistent (permanent or semi-permanent).
A process used to determine which components of the system need to be protected and the types of security risks from which they should be protected.
A value for a performance characteristic that is a boundary between two regions of conformance and, when crossed in one or both directions, will generate an action.
The realizable capacity of the system or its network elements.
Models based on a geographical or topological arrangement; often used as starting points in the development of the network architecture.
Overengineering bandwidth in the network to accommodate most short-and long-term traffic fluctuations. Also known as capacity planning.
See Flows.
Short-lived events or changes in the behavior of the network.
A user-configurable threshold for a parameter. Used in network management.
Using network management data to determine long-term network behaviors, or trends.
A user requirement to be able to access, transfer, or modify information within a tolerable time frame.
Encapsulating information within protocol headers for the purpose of isolating and protecting that information.
A flow specification that describes flows that have stochastic requirements and may include flows that have best-effort requirements.
A flow specification that describes flows that have only best-effort requirements. Also known as a one-part flowspec.
Traffic flowing in the direction from the destination to the source.
The set of requirements gathered or derived from user input; what is needed by users to successfully accomplish their tasks on the system.
Subnetting in which multiple subnet masks are used, creating subnets of different sizes.
Applying tunneling to create multiple isolated networks across a common infrastructure.