Arch Design: Handle remaining glossary entries
Move some more entries to the common glossary. Remove ch_glossary.xml, the remaining entries are explained well in the text and are not needed in the common glossary. Change-Id: Ic205010e0fd72016a9f2177235144bd3b5680dee Closes-Bug: #1354566
This commit is contained in:
parent
056398f678
commit
05fdf69d94
@ -1,456 +0,0 @@
|
|||||||
<?xml version="1.0" encoding="UTF-8"?>
|
|
||||||
<chapter xmlns="http://docbook.org/ns/docbook"
|
|
||||||
xmlns:xi="http://www.w3.org/2001/XInclude"
|
|
||||||
xmlns:xlink="http://www.w3.org/1999/xlink"
|
|
||||||
version="5.0"
|
|
||||||
xml:id="arch-design-glossary">
|
|
||||||
<title>Glossary</title>
|
|
||||||
|
|
||||||
<!--
|
|
||||||
This file needs to be removed. For the remaining entries,
|
|
||||||
figure out which ones should go to the common glossary in
|
|
||||||
../glossary/glossary-terms.xml and which ones can be removed
|
|
||||||
completely. For each entry that should appear in the Arch
|
|
||||||
Design Glossary, a glossterm markup needs to be done in the
|
|
||||||
text.
|
|
||||||
-->
|
|
||||||
<itemizedlist>
|
|
||||||
<listitem>
|
|
||||||
<para>Anycast - A network routing methodology that routes
|
|
||||||
traffic from a single sender to the nearest node, in a
|
|
||||||
pool of nodes.</para>
|
|
||||||
</listitem>
|
|
||||||
<listitem>
|
|
||||||
<para>Broadcast Domain - The layer 2 segment shared by a
|
|
||||||
group of network connected nodes.</para>
|
|
||||||
</listitem>
|
|
||||||
<listitem>
|
|
||||||
<para>Capital Expenditure (CapEx) - A capital expense,
|
|
||||||
capital expenditure, CapEx is an initial cost for
|
|
||||||
building a product, business, or system.</para>
|
|
||||||
</listitem>
|
|
||||||
<listitem>
|
|
||||||
<para>CDN - Content delivery network - a specialized
|
|
||||||
network that is used to distribute content to clients,
|
|
||||||
typically located close to the client for increased
|
|
||||||
performance.</para>
|
|
||||||
</listitem>
|
|
||||||
<listitem>
|
|
||||||
<para>CI/CD - Continuous Integration / Continuous
|
|
||||||
Deployment, a methodology where software is
|
|
||||||
continually built and unit tests run for each change
|
|
||||||
that is merged, or proposed for merge. Continuous
|
|
||||||
Deployment is a software development methodology where
|
|
||||||
changes are deployed into production as they are
|
|
||||||
merged into source control, rather than being
|
|
||||||
collected into a release and deployed at regular
|
|
||||||
intervals</para>
|
|
||||||
</listitem>
|
|
||||||
<listitem>
|
|
||||||
<para>Cloud Broker - A cloud broker is a third-party
|
|
||||||
individual or business that acts as an intermediary
|
|
||||||
between the purchaser of a cloud computing service and
|
|
||||||
the sellers of that service. In general, a broker is
|
|
||||||
someone who acts as an intermediary between two or
|
|
||||||
more parties during negotiations.</para>
|
|
||||||
</listitem>
|
|
||||||
<listitem>
|
|
||||||
<para>Cloud Consumer - User that consumes cloud instances,
|
|
||||||
storage, or other resources in a cloud environment.
|
|
||||||
This user interacts with OpenStack or other cloud
|
|
||||||
management tools.</para>
|
|
||||||
</listitem>
|
|
||||||
<listitem>
|
|
||||||
<para>Cloud Management Platform (CMP) - Products that
|
|
||||||
provide a common interface to manage multiple cloud
|
|
||||||
environments or platforms.</para>
|
|
||||||
</listitem>
|
|
||||||
<listitem>
|
|
||||||
<para>Connection Broker - In desktop virtualization, a
|
|
||||||
connection broker is a software program that allows
|
|
||||||
the end-user to connect to an available
|
|
||||||
desktop.</para>
|
|
||||||
</listitem>
|
|
||||||
<listitem>
|
|
||||||
<para>Direct Attached Storage (DAS) - Data storage that is
|
|
||||||
directly connected to a machine.</para>
|
|
||||||
</listitem>
|
|
||||||
<listitem>
|
|
||||||
<para>Direct Server Return - A technique in load balancing
|
|
||||||
where an initial request is routed through a load
|
|
||||||
balancer, and the reply is sent from the responding
|
|
||||||
node directly to the requester.</para>
|
|
||||||
</listitem>
|
|
||||||
<listitem>
|
|
||||||
<para>Denial of Service (DoS) - In computing, a
|
|
||||||
denial-of-service or distributed denial-of-service
|
|
||||||
attack is an attempt to make a machine or network
|
|
||||||
resource unavailable to its intended users.</para>
|
|
||||||
</listitem>
|
|
||||||
<listitem>
|
|
||||||
<para>Distributed Replicated Block Device (DRBD) - The
|
|
||||||
Distributed Replicated Block Device (DRBD) is a
|
|
||||||
distributed replicated storage system for the Linux
|
|
||||||
platform.</para>
|
|
||||||
</listitem>
|
|
||||||
<listitem>
|
|
||||||
<para>Differentiated Service Code Point (DSCP) - Defined
|
|
||||||
in RFC 2474, this field in IPv4 and IPv6 headers is
|
|
||||||
used to define classes of network traffic, for quality
|
|
||||||
of service purposes.</para>
|
|
||||||
</listitem>
|
|
||||||
<listitem>
|
|
||||||
<para>External Border Gateway Protocol (eBGP) - External
|
|
||||||
Border Gateway Protocol describes a specific
|
|
||||||
implementation of BGP designed for inter-autonomous
|
|
||||||
system communication</para>
|
|
||||||
</listitem>
|
|
||||||
<listitem>
|
|
||||||
<para>Elastic IP - An Amazon Web Services concept, which
|
|
||||||
is an IP address that can be dynamically allocated and
|
|
||||||
reassigned to running instances on the fly. The
|
|
||||||
OpenStack equivalent is a Floating IP.</para>
|
|
||||||
</listitem>
|
|
||||||
<listitem>
|
|
||||||
<para>External Cloud - A cloud environment that exists
|
|
||||||
outside of the control of an organization. Referred to
|
|
||||||
for hybrid cloud to indicate a public cloud or an
|
|
||||||
off-site hosted cloud.</para>
|
|
||||||
</listitem>
|
|
||||||
<listitem>
|
|
||||||
<para>Federated Cloud - A federated cloud describes a
|
|
||||||
multiple sets of cloud resources, for example compute
|
|
||||||
or storage, that are managed by a centralized
|
|
||||||
endpoint.</para>
|
|
||||||
</listitem>
|
|
||||||
<listitem>
|
|
||||||
<para>Flow - A series of packets that are stateful in
|
|
||||||
nature and represent a session. Usually represented by
|
|
||||||
a TCP stream, but can also indicate other packet types
|
|
||||||
that when combined comprise a connection between two
|
|
||||||
points.</para>
|
|
||||||
</listitem>
|
|
||||||
<listitem>
|
|
||||||
<para>Golden Image - An operating system image that
|
|
||||||
contains a set of pre-installed software packages and
|
|
||||||
configurations. This may be used to build standardized
|
|
||||||
instances that have the same base set of configuration
|
|
||||||
to improve mean time to functional application</para>
|
|
||||||
</listitem>
|
|
||||||
<listitem>
|
|
||||||
<para>Graphics Processing Unit (GPU) - A single chip
|
|
||||||
processor with integrated transform, lighting,
|
|
||||||
triangle setup/clipping, and rendering engines that is
|
|
||||||
capable of processing a minimum of 10 million polygons
|
|
||||||
per second. Traditional uses are any compute problem
|
|
||||||
that can be represented as a vector or matrix
|
|
||||||
operation.</para>
|
|
||||||
</listitem>
|
|
||||||
<listitem>
|
|
||||||
<para>Hadoop Distributed File System (HDFS) - A
|
|
||||||
distributed file-system that stores data on commodity
|
|
||||||
machines, providing very high aggregate bandwidth
|
|
||||||
across the cluster.</para>
|
|
||||||
</listitem>
|
|
||||||
<listitem>
|
|
||||||
<para>High Performance Computing (HPC) - Also known as
|
|
||||||
distributed computing - used for computation intensive
|
|
||||||
processes run on a large number of instances</para>
|
|
||||||
</listitem>
|
|
||||||
<listitem>
|
|
||||||
<para>Hierarchical Storage Management (HSM) - Hierarchical
|
|
||||||
storage management is a data storage technique, which
|
|
||||||
automatically moves data between high-cost and
|
|
||||||
low-cost storage media</para>
|
|
||||||
</listitem>
|
|
||||||
<listitem>
|
|
||||||
<para>Hot Standby Router Protocol (HSRP) - Hot Standby
|
|
||||||
Router Protocol is a Cisco proprietary redundancy
|
|
||||||
protocol for establishing a fault-tolerant default
|
|
||||||
gateway, and has been described in detail in RFC
|
|
||||||
2281.</para>
|
|
||||||
</listitem>
|
|
||||||
<listitem>
|
|
||||||
<para>Interior Border Gateway Protocol (iBGP) - Interior
|
|
||||||
Border Gateway Protocol is an interior gateway
|
|
||||||
protocol designed to exchange routing and reachability
|
|
||||||
information within autonomous systems.</para>
|
|
||||||
</listitem>
|
|
||||||
<listitem>
|
|
||||||
<para>Interior Gateway Protocol (IGP) - An Interior
|
|
||||||
Gateway Protocol is a type of protocol used for
|
|
||||||
exchanging routing information between gateways
|
|
||||||
(commonly routers) within an Autonomous System (for
|
|
||||||
example, a system of corporate local area networks).
|
|
||||||
This routing information can then be used to route
|
|
||||||
network-level protocols like IP.</para>
|
|
||||||
</listitem>
|
|
||||||
<listitem>
|
|
||||||
<para>jClouds - An open source multi-cloud toolkit for the
|
|
||||||
Java platform that gives you the freedom to create
|
|
||||||
applications that are portable across clouds while
|
|
||||||
giving you full control to use cloud-specific
|
|
||||||
features.</para>
|
|
||||||
</listitem>
|
|
||||||
<listitem>
|
|
||||||
<para>Jitter - Is the deviation from true periodicity of a
|
|
||||||
presumed periodic signal in electronics and
|
|
||||||
telecommunications, often in relation to a reference
|
|
||||||
clock source.</para>
|
|
||||||
</listitem>
|
|
||||||
<listitem>
|
|
||||||
<para>Jumbo Frame - Ethernet frames with more than 1500
|
|
||||||
bytes of payload.</para>
|
|
||||||
</listitem>
|
|
||||||
<listitem>
|
|
||||||
<para>LAG - Link aggregation group is a term to describe
|
|
||||||
various methods of combining (aggregating) multiple
|
|
||||||
network connections in parallel into a group to
|
|
||||||
increase throughput beyond what a single connection
|
|
||||||
could sustain, and to provide redundancy in case one
|
|
||||||
of the links fail.</para>
|
|
||||||
</listitem>
|
|
||||||
<listitem>
|
|
||||||
<para>Legacy System - An old method, technology, computer
|
|
||||||
system, or application program that is considered
|
|
||||||
outdated.</para>
|
|
||||||
</listitem>
|
|
||||||
<listitem>
|
|
||||||
<para>Looking Glass - A tool that provides information on
|
|
||||||
backbone routing and network efficiency.</para>
|
|
||||||
</listitem>
|
|
||||||
<listitem>
|
|
||||||
<para>Microsoft Azure - A cloud computing platform and
|
|
||||||
infrastructure, created by Microsoft, for building,
|
|
||||||
deploying and managing applications and services
|
|
||||||
through a global network of Microsoft-managed
|
|
||||||
datacenters.</para>
|
|
||||||
</listitem>
|
|
||||||
<listitem>
|
|
||||||
<para>MongoDB - A cross-platform document-oriented
|
|
||||||
database. Classified as a NoSQL database, MongoDB
|
|
||||||
eschews the traditional table-based relational
|
|
||||||
database structure in favor of JSON-like documents
|
|
||||||
with dynamic schemas.</para>
|
|
||||||
</listitem>
|
|
||||||
<listitem>
|
|
||||||
<para>Mean Time Before Failures (MTBF) - Mean time before
|
|
||||||
failures is the predicted elapsed time before inherent
|
|
||||||
failures of a system during operation. MTBF can be
|
|
||||||
calculated as the arithmetic mean (average) time
|
|
||||||
between failures of a system.</para>
|
|
||||||
</listitem>
|
|
||||||
<listitem>
|
|
||||||
<para>Maximum Transmission Unit (MTU) - The maximum
|
|
||||||
transmission unit of a communications protocol of a
|
|
||||||
layer is the size (in bytes) of the largest protocol
|
|
||||||
data unit that the layer can pass onwards.</para>
|
|
||||||
</listitem>
|
|
||||||
<listitem>
|
|
||||||
<para>NAT64 - NAT64 is a mechanism to allow IPv6 hosts to
|
|
||||||
communicate with IPv4 servers. The NAT64 server is the
|
|
||||||
endpoint for at least one IPv4 address and an IPv6
|
|
||||||
network segment of 32-bits.</para>
|
|
||||||
</listitem>
|
|
||||||
<listitem>
|
|
||||||
<para>Network Functions Virtualization (NFV) - Network
|
|
||||||
Functions Virtualization is a network architecture
|
|
||||||
concept that proposes using IT virtualization related
|
|
||||||
technologies, to virtualize entire classes of network
|
|
||||||
node functions into building blocks that may be
|
|
||||||
connected, or chained, together to create
|
|
||||||
communication services.</para>
|
|
||||||
</listitem>
|
|
||||||
<listitem>
|
|
||||||
<para>NoSQL - A NoSQL or Not Only SQL database provides a
|
|
||||||
mechanism for storage and retrieval of data that is
|
|
||||||
modeled in means other than the tabular relations used
|
|
||||||
in relational databases.</para>
|
|
||||||
</listitem>
|
|
||||||
<listitem>
|
|
||||||
<para>Operational Expenditure (OPEX) - An operating
|
|
||||||
expense, operating expenditure, operational expense,
|
|
||||||
operational expenditure or OPEX is an ongoing cost for
|
|
||||||
running a product, business, or system.</para>
|
|
||||||
</listitem>
|
|
||||||
<listitem>
|
|
||||||
<para>Original Design Manufacturers (ODM) - Original
|
|
||||||
Design Manufacturers, a company which designs and
|
|
||||||
manufactures a product which is specified and
|
|
||||||
eventually branded by another firm for sale.</para>
|
|
||||||
</listitem>
|
|
||||||
<listitem>
|
|
||||||
<para>Overlay Network - An overlay network is a computer
|
|
||||||
network which is built on the top of another network.
|
|
||||||
Nodes in the overlay can be thought of as being
|
|
||||||
connected by virtual or logical links, each of which
|
|
||||||
corresponds to a path, perhaps through many physical
|
|
||||||
links, in the underlying network.</para>
|
|
||||||
</listitem>
|
|
||||||
<listitem>
|
|
||||||
<para>Packet Storm - A cause of degraded service or
|
|
||||||
failure that occurs when a network system is
|
|
||||||
overwhelmed by continuous multicast or broadcast
|
|
||||||
traffic.</para>
|
|
||||||
</listitem>
|
|
||||||
<listitem>
|
|
||||||
<para>Power Usage Effectiveness (PUE) - Power usage
|
|
||||||
effectiveness is a measure of how efficiently a
|
|
||||||
computer data center uses energy; specifically, how
|
|
||||||
much energy is used by the computing equipment (in
|
|
||||||
contrast to cooling and other overhead).</para>
|
|
||||||
</listitem>
|
|
||||||
<listitem>
|
|
||||||
<para>Quality of Service (QoS) - Quality of Service is the
|
|
||||||
overall performance of a telephony or computer
|
|
||||||
network, particularly the performance seen by the
|
|
||||||
users of the network.</para>
|
|
||||||
</listitem>
|
|
||||||
<listitem>
|
|
||||||
<para>Remote Desktop Host - A server that hosts Remote
|
|
||||||
Applications as session-based desktops. Users can
|
|
||||||
access a Remote Desktop Host server by using the
|
|
||||||
Remote Desktop Connection client.</para>
|
|
||||||
</listitem>
|
|
||||||
<listitem>
|
|
||||||
<para>Renumbering - Network renumbering, the exercise of
|
|
||||||
renumbering a network consists of changing the IP host
|
|
||||||
addresses, and perhaps the network mask, of each
|
|
||||||
device within the network that has an address
|
|
||||||
associated with it.</para>
|
|
||||||
</listitem>
|
|
||||||
<listitem>
|
|
||||||
<para>Rollback - In database technologies, a rollback is
|
|
||||||
an operation which returns the database to some
|
|
||||||
previous state. Rollbacks are important for database
|
|
||||||
integrity, because they mean that the database can be
|
|
||||||
restored to a clean copy even after erroneous
|
|
||||||
operations are performed.</para>
|
|
||||||
</listitem>
|
|
||||||
<listitem>
|
|
||||||
<para>Remote Procedure Call (RPC) - A powerful technique
|
|
||||||
for constructing distributed, client-server based
|
|
||||||
applications. The communicating processes may be on
|
|
||||||
the same system, or they may be on different systems
|
|
||||||
with a network connecting them.</para>
|
|
||||||
</listitem>
|
|
||||||
<listitem>
|
|
||||||
<para>Recovery Point Objective (RPO) - A recovery point
|
|
||||||
objective is defined by business continuity planning.
|
|
||||||
It is the maximum tolerable period in which data might
|
|
||||||
be lost from an IT service due to a major incident.
|
|
||||||
The RPO gives systems designers a limit to work
|
|
||||||
to.</para>
|
|
||||||
</listitem>
|
|
||||||
<listitem>
|
|
||||||
<para>Recovery Time Objective (RTO) - The recovery time
|
|
||||||
objective is the duration of time and a service level
|
|
||||||
within which a business process must be restored after
|
|
||||||
a disaster (or disruption) in order to avoid
|
|
||||||
unacceptable consequences associated with a break in
|
|
||||||
business continuity.</para>
|
|
||||||
</listitem>
|
|
||||||
<listitem>
|
|
||||||
<para>Software Development Kit (SDK) - A software
|
|
||||||
development kit is typically a set of software
|
|
||||||
development tools that allows for the creation of
|
|
||||||
applications for a certain software package, software
|
|
||||||
framework, hardware platform, computer system, video
|
|
||||||
game console, operating system, or similar development
|
|
||||||
platform.</para>
|
|
||||||
</listitem>
|
|
||||||
<listitem>
|
|
||||||
<para>Service Level Agreement (SLA) - A service-level
|
|
||||||
agreement is a part of a service
|
|
||||||
contract[disambiguation needed] where a service is
|
|
||||||
formally defined. In practice, the term SLA is
|
|
||||||
sometimes used to refer to the contracted delivery
|
|
||||||
time (of the service or performance).</para>
|
|
||||||
</listitem>
|
|
||||||
<listitem>
|
|
||||||
<para>Software Development Lifecycle (SDLC) - Software
|
|
||||||
development life cycle - A software development
|
|
||||||
process, also known as a software development
|
|
||||||
life-cycle (SDLC), is a structure imposed on the
|
|
||||||
development of a software product.</para>
|
|
||||||
</listitem>
|
|
||||||
<listitem>
|
|
||||||
<para>Top of Rack Switch (ToR Switch) - A Top of the Rack
|
|
||||||
or (TOR) switch is a small port count switch that sits
|
|
||||||
on the very top or near the top of a Telco rack you
|
|
||||||
see in Datacenters.</para>
|
|
||||||
</listitem>
|
|
||||||
<listitem>
|
|
||||||
<para>Traffic Shaping - Traffic shaping (also known as
|
|
||||||
"packet shaping") is a computer network traffic
|
|
||||||
management technique which delays some or all
|
|
||||||
datagrams to bring them into compliance with a desired
|
|
||||||
traffic profile. Traffic shaping is a form of rate
|
|
||||||
limiting.</para>
|
|
||||||
</listitem>
|
|
||||||
<listitem>
|
|
||||||
<para>Tunneling - Computer networks use a tunneling
|
|
||||||
protocol when one network protocol (the delivery
|
|
||||||
protocol) encapsulates a different payload protocol.
|
|
||||||
By using tunneling one can (for example) carry a
|
|
||||||
payload over an incompatible delivery-network, or
|
|
||||||
provide a secure path through an untrusted
|
|
||||||
network.</para>
|
|
||||||
</listitem>
|
|
||||||
<listitem>
|
|
||||||
<para>Virtual Desktop Infrastructure (VDI) - Virtual
|
|
||||||
Desktop Infrastructure is a desktop-centric service
|
|
||||||
that hosts user desktop environments on remote
|
|
||||||
servers, which are accessed over a network using a
|
|
||||||
remote display protocol. A connection brokering
|
|
||||||
service is used to connect users to their assigned
|
|
||||||
desktop sessions.</para>
|
|
||||||
</listitem>
|
|
||||||
<listitem>
|
|
||||||
<para>Virtual Local Area Networks (VLAN) - In computer
|
|
||||||
networking, a single layer-2 network may be
|
|
||||||
partitioned to create multiple distinct broadcast
|
|
||||||
domains, which are mutually isolated so that packets
|
|
||||||
can only pass between them via one or more routers;
|
|
||||||
such a domain is referred to as a virtual local area
|
|
||||||
network, virtual LAN or VLAN.</para>
|
|
||||||
</listitem>
|
|
||||||
<listitem>
|
|
||||||
<para>Voice over Internet Protocol (VoIP) -
|
|
||||||
Voice-over-Internet Protocol (VoIP) is a methodology
|
|
||||||
and group of technologies for the delivery of voice
|
|
||||||
communications and multimedia sessions over Internet
|
|
||||||
Protocol (IP) networks, such as the Internet.</para>
|
|
||||||
</listitem>
|
|
||||||
<listitem>
|
|
||||||
<para>Virtual Router Redundancy Protocol (VRRP) - The
|
|
||||||
Virtual Router Redundancy Protocol (VRRP) is a
|
|
||||||
computer networking protocol that provides for
|
|
||||||
automatic assignment of available Internet Protocol
|
|
||||||
(IP) routers to participating hosts. This increases
|
|
||||||
the availability and reliability of routing paths via
|
|
||||||
automatic default gateway selections on an IP
|
|
||||||
sub-network.</para>
|
|
||||||
</listitem>
|
|
||||||
<listitem>
|
|
||||||
<para>VXLAN Tunnel Endpoint (VTEP) - VXLAN Tunnel Endpoint
|
|
||||||
- Used for frame encapsulation. VTEP functionality can
|
|
||||||
be implemented in software such as a virtual switch or
|
|
||||||
in the form a physical switch.</para>
|
|
||||||
</listitem>
|
|
||||||
<listitem>
|
|
||||||
<para>Virtual Extensible Local Area Network (VXLAN) -
|
|
||||||
Virtual Extensible LAN is a network virtualization
|
|
||||||
technology that attempts to ameliorate the scalability
|
|
||||||
problems associated with large cloud computing
|
|
||||||
deployments. It uses a VLAN-like encapsulation
|
|
||||||
technique to encapsulate MAC-based OSI layer 2
|
|
||||||
Ethernet frames within layer 3 UDP packets.</para>
|
|
||||||
</listitem>
|
|
||||||
<listitem>
|
|
||||||
<para>Wide Area Network (WAN) - A wide area network is a
|
|
||||||
network that covers a broad area using leased or
|
|
||||||
private telecommunication lines.</para>
|
|
||||||
</listitem>
|
|
||||||
</itemizedlist>
|
|
||||||
</chapter>
|
|
@ -157,7 +157,8 @@
|
|||||||
<para>Security considerations, such as how data is secured
|
<para>Security considerations, such as how data is secured
|
||||||
between client and endpoint and any traffic that
|
between client and endpoint and any traffic that
|
||||||
traverses the multiple clouds, from eavesdropping to
|
traverses the multiple clouds, from eavesdropping to
|
||||||
DoS activities must be addressed. Business and
|
<glossterm baseform="denial of service (DoS)">DoS</glossterm>
|
||||||
|
activities must be addressed. Business and
|
||||||
regulatory requirements dictate the security approach
|
regulatory requirements dictate the security approach
|
||||||
that needs to be taken.</para>
|
that needs to be taken.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
|
@ -2325,6 +2325,20 @@
|
|||||||
</glossdef>
|
</glossdef>
|
||||||
</glossentry>
|
</glossentry>
|
||||||
|
|
||||||
|
<glossentry>
|
||||||
|
<glossterm>denial of service (DoS)</glossterm>
|
||||||
|
<indexterm class="singular">
|
||||||
|
<primary>denial of service (DoS)</primary>
|
||||||
|
</indexterm>
|
||||||
|
|
||||||
|
<glossdef>
|
||||||
|
<para>
|
||||||
|
Denial of service (DoS) is a short form for
|
||||||
|
denial-of-service attack. This is a malicious attempt to
|
||||||
|
prevent legitimate users from using a service.
|
||||||
|
</para>
|
||||||
|
</glossdef>
|
||||||
|
</glossentry>
|
||||||
<glossentry>
|
<glossentry>
|
||||||
<glossterm>deprecated auth</glossterm>
|
<glossterm>deprecated auth</glossterm>
|
||||||
<indexterm class="singular">
|
<indexterm class="singular">
|
||||||
|
Loading…
x
Reference in New Issue
Block a user