Created for novices and experts alike, the periodic table of application delivery and security defines the critical components necessary for resilient application delivery and security infrastructure.
Inspired by the foundational work of inventor Dmitri Mendeleev, this table categorizes 110 essential elements into 10 distinct blocks, ranging from application delivery and security to application performance and optimization. Click each element for details on the topic.
Application deployment | Security | Network elements | Cloud native | Availability |
Management and automation | Performance | Platform | Observability | Optimization |
1 Opd On-premises |
82 Aff ADC form factors |
||||||||||||||||
2 Pc Private cloud |
8 Cm Centralized management |
52 Opa One pass architecture |
58 Mcp Multi-core processing |
64 Mtcp Multipath TCP |
70 Lb Load balancing... |
76 Ciap Customized IP... |
83 Mpx Single tenant... |
||||||||||
3 Puc Public cloud |
9 Ct Configuration templates |
53 La Latency |
59 Sa Security acceleration |
65 Tcpo TCP optimization |
71 Gslb Global server... |
77 Vs VServer |
84 Sdx Multi-tenant... |
||||||||||
4 Hc Hybrid cloud |
10 Ad Application dashboard |
14 Ps Physical security |
16 En Encryption |
20 Ipr IP reputation |
24 Lacl L4-L7 & Network... |
28 Ids Instrusion dectection... |
32 Mf Modular firewall |
36 Sp Security posture |
40 Httpc HTTP callouts |
44 Aps API security |
48 Waf Web application... |
54 Tp Throughput |
60 Tcpm TCP multiplexing |
66 Hso HTTP/2 & HTTP/3... |
72 Ft Fault tolerance |
78 Nat Network address... |
85 Vpx Virtual form... |
5 Mc Multi-cloud |
11 Spm Single pane of glass... |
15 Wavs Web app vulnerability... |
17 Vp Virtual patching |
21 Vpn Virtual private... |
25 Mfa Multi-factor authentication |
29 Sso Single sign-on |
33 Iam Identity and access... |
37 Ztna Zero trust nework... |
41 Df Device fingerprinting |
45 Es Endpoint security |
49 Mdm Mobile device... |
55 Tm Traffic management |
61 Tcpb TCP buffering |
67 Ec Edge computing |
73 Dr Disaster recovery |
79 Dns Domain name... |
86 Cpx Container-based... |
6 Mo Monoliths |
12 Apa Application centric APIs |
18 Idp Identity providers |
22 Rbac Role-based... |
26 Abac Attribute-based... |
30 Ba Biometric authentication |
34 Tba Token-based authentication |
38 Sm Session management |
42 Bal Block/allow lists |
46 Dsi Directory services... |
50 Pam Privileged access... |
56 Ch Caching |
62 Tcps TCP stack |
68 Cdn Content delivery... |
74 Cr Cache redirection |
80 Cs Content switching |
87 Blx Bare metal... |
|
7 Mi Microservices |
13 Cl Centralized licensing |
19 Scp Secure coding... |
23 Rl Rate limiting |
27 Bm Bot management |
31 Zda Zero-day attacks |
35 Ddos Distributed denial... |
39 Si SQL injection |
43 Xss Cross-site scripting |
47 Csrf Cross-site request.... |
51 Mitm Man-in-the-middle... |
57 Sslo SSL offloading |
63 Cl Clustering |
69 Wl Web logging |
75 As Auto-scale |
81 Pbr Policy based... |
88 Fipc FIPS certified... |
|
89 Ki Kubernetes Ingress |
90 Sm Service mesh |
91 Apg API gateway |
92 Crd Custom resource... |
93 Ur URL routing |
94 Nst North-south traffic |
95 Ewt East-west traffic |
96 Tdpt Traffic distribution... |
97 Sg Service graph |
98 Ci/Cd Continuous integration... |
99 Acd Automated canary... |
|||||||
100 M Metrics |
101 E Events |
102 L Logs |
103 T Traces |
104 Rt Response time |
105 Ss Service status |
106 Gi Gateway insight |
107 Aahm Application & ADC... |
108 |
109 Apii API insights |
110 Noe Network observability... |
Opd
On-premises
Applications are installed and run on servers within an organization's own data centers or physical locations. This deployment type provides full control over infrastructure but may require significant hardware and maintenance costs.
Pc
Private cloud
A cloud computing environment dedicated to a single organization, where all resources are isolated and in the control of the organization. This offers enhanced privacy, security, and control over infrastructure, but requires significant investment in hardware and management. A private cloud is also called an internal or corporate cloud.
Puc
Public cloud
The public cloud is defined as computing services offered by third-party providers over the public Internet, making them available to anyone who wants to use or purchase them. They may be free or sold on-demand, allowing customers to pay only per usage for the CPU cycles, storage, or bandwidth they consume.
Hc
Hybrid cloud
Hybrid cloud refers to a mixed computing, storage, and services environment made up of on-premises infrastructure, private cloud services, and a public cloud - - with orchestration among the various platforms. It provides the flexibility to run workloads on-premises or in the cloud, enabling organizations to optimize performance, scalability, and cost-effectiveness based on their specific needs and requirements.
Mc
Multi-cloud
Multi-cloud refers to the strategic use of multiple cloud computing services or platforms from different providers. It allows organizations to diversify their cloud deployments, leverage the unique features and strengths of each cloud provider, and avoid vendor lock-in. This approach offers redundancy, resilience, and flexibility in deploying workloads across various cloud environments.
Mo
Monoliths
Monolithic refers to a software architecture where an application is built as a single, indivisible unit, with all components tightly integrated and interdependent. It’s restrictive and time-consuming to modify monolithic architecture as small changes impact large areas of the code base.
Mi
Microservices
Microservices are an architectural approach that composes software into small independent components or services. Each service performs a single function and communicates with other services through a well-defined interface. Because they run independently, each service can be updated, modified, deployed, or scaled as required.
Cm
Centralized management
The centralized supervision and control of a collection of application delivery components or instances encompasses configuration management, automation, orchestration, updates, monitoring, and optimization tasks. This ensures the efficient and consistent operation of multiple application delivery resources within an organization's network.
Ct
Configuration templates
Pre-defined configuration templates or profiles that simplify the task of managing complex ADC configurations for applications. They can be created for configuring a specific feature of ADC, migrating between environments, or creating configurations for application deployments such as Jira, any CRM, or bespoke applications. These templates should be declarative, atomic, versioned, composable, and app-driven.
Ad
Application dashboard
An application dashboard is a user interface that provides a visual representation of key metrics, insights, and performance indicators related to an organization's applications. It offers a centralized view of application health, usage, and security, allowing administrators to monitor, analyze, and manage application environments efficiently and make informed decisions to ensure optimal performance and security.
Spm
Single pane of glass management
Single pane of glass management refers to a simplified approach where administrators can view and manage all aspects of application delivery and security from a single, unified interface. The ideal management tool helps manage the application delivery infrastructure across any application, environment, or ADC form factor.
Apa
Application-centric APIs
Application-centric APIs let application teams manage ADC infrastructure as code and also the ADC management console. These APIs enable teams to quickly configure ADC infrastructure to deploy applications faster. They also protect the integrity of the production environment with policy-based enforcement by validating all new configurations against the running configuration.
Cl
Centralized licensing
Centralized licensing refers to a system where software application or security tool licenses are managed from a central location. Monitoring license usage and managing available licenses efficiently prevents organizations from missing renewal dates and paying additional reinstatement or maintenance fees. This ensures compliance with licensing agreements and allows organizations to optimize license usage and costs across their entire IT infrastructure.
Ps
Physical security
Physical security encompasses measures to safeguard the physical infrastructure housing ADC devices, protecting them from unauthorized access, theft, and environmental threats to ensure the availability and integrity of application delivery services.
Wavs
Web app vulnerability scanning
Web application vulnerability scanning finds critical issues in applications and websites that could have serious consequences if left unresolved. It systematically scans for vulnerabilities such as SQL injection, cross-site scripting, and security misconfigurations, helping maintain the integrity and security of websites and online services.
En
Encryption
The process of converting data into a ciphertext to prevent unauthorized access, ensuring data confidentiality and security during storage or transmission.
Vp
Virtual patching
Virtual patching is a security measure that involves deploying network rules to prevent exploitation of known vulnerabilities. It's implemented outside vulnerable applications, often at network perimeters or hosts, providing temporary protection until an official patch is available, without altering the software itself.
Idp
Identity providers
Identity providers are services or systems that manage and authenticate user identities, providing single sign-on (SSO) capabilities and securely granting access to multiple applications and services using a single set of credentials.
Scp
Secure coding practices
Secure coding practices involve writing software code following established security principles to prevent vulnerabilities and protect against security threats, ensuring applications are less prone to exploitation. This includes maintaining both the source code and any third-party libraries in a secure state.
Ipr
IP reputation
A system that categorizes IP addresses based on their historical behavior to identify potential threats or malicious activity, helping organizations make informed decisions about allowing or blocking network traffic.
Vpn
Virtual private networks
Virtual private networks create secure, encrypted communication channels over public networks, enabling remote users to access applications privately and securely. ADCs enhance VPN performance, scalability, and security, ensuring seamless and protected application access for remote users.
Rbac
Role-based access control
An access control model that restricts system access based on user roles and responsibilities, ensuring that individuals only have permissions necessary for their designated tasks, enhancing security and compliance.
Rl
Rate limiting
Rate limiting is a technique used to control the rate of requests a client can make to a server. This is achieved by setting a limit on the number of requests per time interval (for example., requests per second) or by limiting the bandwidth available to each user. The primary goal is to prevent the overuse of resources, ensure fair resource distribution among users, and protect against certain types of attacks such as denial-of-service (DoS). This mechanism is crucial for maintaining the stability and reliability of web applications and services.
Lacl
L4-L7 & Network access control lists
L4-L7 and Network Access Control Lists are security policies that govern traffic at different layers of the network stack. They control access to resources, devices, or services by defining rules based on source, destination, and other criteria, enhancing network security.
Mfa
Multi-factor authentication
MFA is a security method that requires users to provide multiple forms of verification, such as a password, biometric scan, or one-time code, to access an account or system, enhancing authentication security by adding layers of protection.
Abac
Attribute-based access control
ABAC is an access control model that makes access decisions based on attributes associated with users, resources, and environmental conditions, offering granular and dynamic control over access rights and permissions.
Bm
Bot management
Bot Management involves techniques and tools to distinguish between human and automated bot traffic, protecting web applications and services from malicious bots and their potentially harmful activities.
Ids
Intrusion detection system
IDS is a security tool that monitors network or host activities for signs of unauthorized access, attacks, or policy violations, alerting administrators to potential threats and vulnerabilities.
Sso
Single sign-on
SSO is an authentication method that allows users to access multiple applications and services with a single set of credentials, enhancing user convenience while maintaining security.
Ba
Biometric authentication
Biometric authentication is a security method that verifies a person's identity using physical or behavioral characteristics like fingerprints, facial recognition, or voice patterns, enhancing authentication security by relying on unique biological traits.
Zda
Zero-day attacks
These are newly launched attacks for which security firms have not yet developed an effective defense. As these attacks occur before a fix or patch is available, they are a major threat to all users. Zero-day vulnerabilities are highly sought after by attackers and can cause significant damage if successfully exploited.
Mf
Modular firewall
A modular firewall is a security device that provides customizable and scalable protection for networks and applications. It consists of individual components or modules that can be configured and deployed based on specific security requirements. This modular approach allows organizations to tailor their firewall setup to address unique security challenges.
Iam
Identity and access management
Identity and access management (IAM) is a security framework that ensures only authorized individuals have access to resources and applications within an organization's network. IAM systems authenticate users, assign them appropriate permissions based on their roles, and manage their access throughout their lifecycle. This helps prevent unauthorized access and protects sensitive data from breaches or misuse.
Tba
Token-based authentication
Token-based authentication is a security protocol that uses an access token to verify an authorized user’s identity. Users provide a unique token, often generated dynamically, to access systems or resources, enhancing security by using time-limited and one-time codes for verification.
Ddos
Distributed denial of service
In a distributed denial-of-service attack, multiple entities operate together to attack one target. DDoS attackers often make use of a botnet—a group of hijacked internet-connected devices to carry out large-scale attacks. Attackers take advantage of security vulnerabilities to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting the services of a host connected to a network.
Sp
Security posture
Security posture is an organization's readiness and effectiveness in safeguarding its networks, systems, and data against evolving cyber threats. It encompasses maintaining visibility into attack surfaces, implementing protective controls, enabling real-time monitoring, and establishing robust response capabilities. A strong security posture ensures a reduced risk of breaches and vulnerabilities, thereby enhancing overall resilience.
Ztna
Zero trust network access
Zero trust network access is an IT security model that assumes no trust between the user and the resource they are trying to access. The model verifies the identity and authorization of all users and devices, whether inside or outside a network, before granting access to resources. It provides secure remote access to an organization's applications, data, and services based on clearly defined access control policies.
Sm
Session management
Session management involves controlling and maintaining user sessions securely. It ensures that users are authenticated properly upon accessing an application and that their sessions are managed securely throughout their interaction. This includes features such as session timeout, session encryption, and preventing session hijacking to safeguard user data and prevent unauthorized access.
Si
SQL injection
SQL injection is a common cyber attack where malicious actors exploit vulnerabilities in web applications to insert malicious SQL code into input fields. This code can manipulate the database backend, enabling attackers to access, modify, or delete sensitive data. SQL injection attacks pose a significant threat to application security and can lead to data breaches and unauthorized access.
Httpc
HTTP callouts
HTTP callouts are requests made by an application to external web services or APIs over the HTTP protocol. These callouts enable applications to interact with external systems, retrieve data, or perform actions. In the context of application delivery and security, HTTP callouts may be used for integrating with third-party services, fetching updates or threat intelligence, or accessing cloud-based resources.
Df
Device fingerprinting
Device fingerprinting is a method to uniquely identify and track devices accessing a network or application. It analyzes various attributes of the device, such as hardware configurations, software settings, and browsing behavior, to create a unique fingerprint. This fingerprint helps in detecting and preventing fraudulent activities, such as account takeover or unauthorized access, by identifying suspicious devices.
Bal
Block/allow lists
Block/allow lists, also known as blacklists and whitelists, are security measures used to control access to resources or actions. A blocklist contains items that are prohibited or restricted, while an allowlist includes items that are explicitly permitted. By configuring block/allow lists, organizations can enforce security policies and regulate access to ensure the integrity and safety of their systems.
Xss
Cross-site scripting
Cross-site scripting is a common web security vulnerability that occurs when attackers inject malicious scripts into web pages viewed by other users. These scripts can execute in the context of a user's browser, allowing attackers to steal sensitive information, hijack user sessions, or deface websites. XSS attacks pose significant risks to user privacy and website integrity.
Aps
API security
API security involves protecting Application Programming Interfaces (APIs) from unauthorized access, misuse, and attacks. It ensures that only authorized users and applications can interact with APIs, and that data exchanged through APIs is encrypted and secure. API security measures prevent data breaches and maintain the integrity of API transactions.
Es
Endpoint security
Endpoint security focuses on protecting individual devices, such as computers, laptops, and mobile devices, from cyber threats. It encompasses various measures, including antivirus software, firewalls, and encryption, to secure endpoints against malware, unauthorized access, and data breaches.
Dsi
Directory services integration
Directory services integration involves connecting and synchronizing with directory services, such as Active Directory or LDAP, to centralize user management and authentication, enhancing security through streamlined identity and access control.
Csrf
Cross-site request forgery
Cross-site request forgery is an attack that forces authenticated users to submit a request to a web application against which they are currently authenticated. Attackers trick users into unknowingly submitting malicious requests, often through social engineering or deceptive links. These requests can lead to unauthorized actions, such as transferring funds or changing account settings, without the user's consent.
Waf
Web application firewall
A WAF or web application firewall helps protect web applications by monitoring and filtering incoming HTTP traffic between a web application and the internet, identifying and blocking malicious requests while permitting legitimate ones. It typically protects web applications from attacks such as cross-site forgery, cross-site scripting (XSS), file inclusion, and SQL injection, among others. A WAF is a protocol layer 7 defense in the OSI model.
Mdm
Mobile device management
Mobile device management involves the administration and control of mobile devices used within an organization. It is a solution that allows organizations to securely manage and control mobile devices, applications, and data, ensuring compliance with security policies and protecting sensitive information.
Pam
Privileged access management
Privileged access management is a comprehensive security solution designed to manage and monitor access to privileged accounts and critical systems, ensuring that only authorized individuals can utilize these powerful privileges. PAM helps organizations protect against insider threats or external attacks by providing stringent control over who can access, use, and modify privileged accounts and systems.
Mitm
Man-in-the-middle attacks
A man-in-the-middle attack is a type of cyber attack in which the attacker secretly intercepts and relays messages between two parties who believe they are communicating directly with each other. Here the attacker intercepts and then controls the entire conversation. MitM cyber attacks pose a serious threat to online security because they give the attacker the ability to capture and manipulate sensitive personal information such as login credentials, account details or credit card numbers in real-time.
Opa
One pass architecture
One pass architecture refers to a streamlined approach in network processing where packets are processed only once, minimizing latency and maximizing efficiency. It involves handling multiple tasks, such as security inspection, traffic management, and content manipulation, in a single pass through the system, reducing the overall processing overhead and enhancing performance.
La
Latency
Latency refers to the delay or lag experienced in data transmission between a source and a destination. It represents the time it takes for a packet of data to travel from its origin to its destination. Lower latency indicates faster data transfer, while higher latency can result in slower response times and delays in communication.
Tp
Throughput
Throughput refers to the amount of data transferred successfully over a network within a specific timeframe. It measures the rate at which data can be transmitted from one point to another, typically expressed in bits per second (bps) or packets per second (pps). Higher throughput indicates a faster and more efficient network performance.
Tm
Traffic Management
Traffic management involves the control and optimization of data flow across a network to ensure efficient and reliable communication. It encompasses various techniques such as load balancing, prioritization, and congestion control to regulate the flow of network traffic. Effective traffic management improves network performance, minimizes delays, and enhances overall user experience.
Ch
Caching
Caching is a technique used to store frequently accessed data temporarily in a local cache memory. This allows subsequent requests for the same data to be served quickly from the cache instead of fetching it from the original source. Caching improves system performance by reducing latency and conserving bandwidth.
Sslo
SSL offloading
SSL offloading, also known as SSL termination, is a process where Secure Sockets Layer (SSL) or Transport Layer Security (TLS) encryption and decryption tasks are performed by a dedicated hardware or software component, such as a load balancer or proxy server, instead of the web server. This offloading helps to reduce the computational burden on the web server and improve overall performance
Mcp
Multi-core processing
Multi-core processing involves the use of multiple processing units (cores) within a single CPU to execute tasks in parallel, enhancing computational performance and efficiency for applications that can be divided into concurrent threads.
Sa
Security acceleration
Security acceleration refers to the optimization of cryptographic operations and security protocols to enhance the performance of security measures such as encryption, decryption, and authentication. By utilizing specialized hardware or software algorithms, security acceleration speeds up these processes, ensuring robust security without compromising system performance or user experience.
Tcpm
TCP multiplexing
TCP multiplexing is a technique that allows multiple TCP connections to be combined or multiplexed into a single connection. This enables more efficient use of network resources by reducing the overhead associated with establishing and maintaining individual connections. TCP multiplexing enhances network performance and scalability, particularly in environments with high connection rates.
Tcpb
TCP buffering
TCP buffering refers to the process of temporarily storing data in a buffer before it is transmitted over a TCP connection. This buffering helps to smooth out fluctuations in data transmission rates and ensures that data is delivered in a timely and orderly manner. TCP buffering improves network performance and reliability by mitigating the effects of network congestion and packet loss.
Tcps
TCP stack
The TCP stack, or Transmission Control Protocol stack, is a software component responsible for implementing the TCP/IP protocol suite in networking devices. It manages the transmission and reception of data packets over a network, ensuring reliable and orderly communication between devices. The TCP stack handles tasks such as segmentation, reassembly, flow control, and error detection to facilitate data exchange.
Cl
Clustering
Clustering is a method of combining multiple computing resources, such as servers or network devices, into a unified system to improve performance, scalability, and availability. By distributing workloads across clustered nodes, clustering enhances fault tolerance and enables seamless failover in case of hardware failures or network issues, ensuring uninterrupted service delivery.
Mtcp
Multipath TCP
Multipath TCP is a protocol that enables a single TCP connection to use multiple network paths simultaneously. By distributing data across multiple paths, multipath TCP enhances reliability, performance, and resilience to network fluctuations, ensuring efficient data transmission even in environments with heterogeneous or unreliable network connections.
Tcpo
TCP optimization
TCP optimization refers to techniques and strategies aimed at improving the performance and efficiency of the Transmission Control Protocol (TCP) in network communications. It involves tuning parameters, adjusting configurations, and implementing optimizations to minimize latency, reduce packet loss, and maximize throughput, ensuring optimal TCP-based data transmission across networks.
Hso
HTTP/2 & HTTP/3 support & optimization
HTTP/2 and HTTP/3 support and optimization involve implementing and optimizing the latest versions of the HTTP protocol for web communication. This includes leveraging features such as multiplexing, header compression, and server push in HTTP/2, as well as the enhanced performance and security features of HTTP/3, to improve website speed, efficiency, and user experience.
Read more:
Ec
Edge computing
Edge computing refers to the paradigm of processing and analyzing data closer to the source of its generation, at the network's edge, rather than in a centralized data-processing warehouse. This approach reduces latency, improves response times, and decreases bandwidth usage, enhancing the overall performance and efficiency of data-driven applications and services.
Cdn
Content delivery network
A Content Delivery Network (CDN) is a distributed network of servers strategically placed in various geographical locations to deliver web content to users more efficiently. By caching and distributing content closer to end-users, CDNs reduce latency, decrease server load, and enhance website performance, resulting in faster page load times and improved user experience.
Wl
Web logging
Web logging, commonly known as logging, refers to the practice of recording and storing data related to web server activity, user interactions, and application performance. It enhances security and performance optimization by providing insights into user behavior, errors, and system health. The data, often in the form of log files, captures details such as HTTP requests, errors, user sessions, and system events, enabling analysis, troubleshooting, and monitoring of web applications and infrastructure.
Lb
Load balancing, L4-L7
Load balancing, L4-L7 is a networking technique that distributes incoming network traffic across multiple servers or resources to optimize performance, enhance availability, and ensure scalability. Operating at layers 4 to 7 of the OSI model, it intelligently routes requests based on factors such as server load, response time, and content type.
Gslb
Global server load balancing
Global Server Load Balancing (GSLB) utilizes DNS-based techniques to distribute incoming internet traffic across on-premises and cloud data centers in geographically distributed locations. Its purpose is to ensure high availability of applications by directing users to the most appropriate server, thereby minimizing the impact of data center outages or network disruptions. The benefits of GSLB include increased reliability and reductions in latency.
Ft
Fault tolerance
Fault tolerance is the ability of a system or component to continue functioning in the event of a failure or fault. It involves designing a system in such a way that it can gracefully handle failures without compromising the overall availability and reliability. In the context of application delivery, fault tolerance relates to the use of load balancing and failover solutions to ensure availability via redundancy and rapid disaster recovery.
Dr
Disaster recovery
Disaster recovery consists of IT technologies and best practices designed to prevent or minimize data loss and business disruption in the event of an application failure or a catastrophic failure at a data center. This process is in place to route application traffic to an alternate on-premises or cloud data center. Load balancers facilitate automated recovery processes to minimize or eliminate downtime.
Cr
Cache redirection
Cache redirection is a technique used in content delivery networks (CDNs) to optimize content delivery and improve user experience. It involves directing client requests for cached content to the nearest edge server or cache node, reducing latency and network traffic by serving content from a location closer to the user's location.
As
Auto-scale
Auto-scale is a cloud computing feature that dynamically adjusts the number of compute resources allocated to an application based on demand. It automatically increases resources during periods of high traffic or demand and decreases them during periods of low activity, optimizing performance and reducing costs.
Ciap
Customized IP address properties
Customized IP address properties refer to the ability to tailor specific attributes or configurations of IP addresses to suit particular requirements or preferences within a network environment. This customization may include settings such as subnet masks, gateway addresses, DNS servers, and other parameters, enhancing flexibility and control over network infrastructure.
Vs
VServer
A VServer, or Virtual Server, is a software-based entity that emulates the functionality of a physical server within a virtualized environment. It enables the hosting of multiple virtual servers on a single physical server, each with its own operating system, applications, and resources, providing flexibility and scalability in resource allocation.
Nat
Network address translation
Network address translation is a process used in networking to modify the IP addresses of packets as they traverse a router or firewall. It allows multiple devices within a private network to share a single public IP address, enhancing security and conserving public IP addresses by masking internal IP addresses from external networks.
Dns
Domain name system
The Domain Name System (DNS) is a decentralized naming system that translates domain names (such as example.com) into IP addresses, enabling users to access websites and services using human-readable addresses. It functions as the internet's phonebook, facilitating the resolution of domain names to their corresponding IP addresses for communication between devices on the network.
Cs
Content switching
Content switching is a networking technique that involves directing incoming network traffic to different servers or services based on specific criteria such as URL, HTTP headers, or payload content. It optimizes resource utilization and enhances scalability by efficiently distributing traffic across multiple backend servers or services, improving overall performance and reliability.
Pbr
Policy based routing
Policy-based routing is a networking technique used to control the path of network packets based on predefined policies or criteria. It enables administrators to specify routing decisions according to factors such as source address, destination address, protocol, or application, allowing for flexible and granular control over how traffic is forwarded within a network.
Aff
ADC form factors
ADC form factors refer to the various physical or virtual configurations in which Application delivery controllers (ADCs) are available. These form factors include physical appliances, virtual appliances, containerized solutions, and cloud-based services, catering to diverse deployment needs and network environments.
Mpx
Single-tenant H/W form factor
A physical hardware form factor designed for high-performance network and application delivery. It typically involves a physical hardware appliance that provides application delivery and load balancing with options for high-performance web application security and SSL offloading support.
Sdx
Multi-tenant H/W form factor
A virtualized or software-based approach to managing and controlling network resources and services. It is usually a fully isolated multi-tenant solution that allows a single administrator to configure and manage the appliance and delegate the administration of each hosted instance to tenants.
Vpx
Virtual form factor
Virtual form factor represents a virtualized form factor that encapsulates network and application delivery services within a virtual machine, suitable for deployment in virtualized environments for flexibility and scalability. These virtual solutions can be deployed on multiple hypervisors and hybrid multi-cloud environments.
Cpx
Container-based form factor
A containerized form factor, where network and application delivery services are packaged within containers, enabling consistent deployment and management across various environments. A container-based ADC supports application delivery in multi-cloud and on-premises environments, such as Kubernetes and OpenShift.
Blx
Bare metal form factor
A virtual appliance designed to run natively on bare metal Linux on commercial-off-the-shelf servers. It can be easily plugged in with an existing orchestration setup and any open source tools that are supported for Linux environments can be seamlessly integrated with this appliance.
Fipc
FIPS certified H/W and S/W
FIPS certified hardware and software (H/W and S/W) refers to products that have undergone rigorous testing and validation according to the Federal Information Processing Standards (FIPS). This certification ensures compliance with security standards mandated for use in government agencies and other regulated industries, guaranteeing robust security features and encryption algorithms.
Ki
Kubernetes ingress
Kubernetes ingress is an API object that controls external access to services running within a Kubernetes cluster. It acts as an entry point, routing incoming HTTP and HTTPS traffic to the appropriate services based on defined rules and configurations, facilitating load balancing, SSL termination, and routing functionality within the cluster.
Sm
Service mesh
A service mesh is a dedicated infrastructure layer that facilitates communication between microservices in a distributed application. It provides features like service discovery, load balancing, traffic management, and security policies, enabling resilient and secure communication between services without requiring changes to application code.
Apg
API gateway
An API gateway is a centralized entry point for managing and routing API requests between clients and backend services. It acts as a reverse proxy, handling tasks such as authentication, authorization, rate limiting, request transformation, and protocol translation, providing a unified interface for interacting with multiple APIs.
Crd
Custom resource definitions
Custom resource definitions (CRDs) allow Kubernetes users to extend the Kubernetes API and define their custom resources. These resources can represent applications, services, or any other entities specific to their use case. CRDs enable users to manage and interact with these custom resources using standard Kubernetes tools and practices.
Ur
URL routing
URL routing is the process of directing incoming web requests to the appropriate destination based on predefined rules and configurations. In the context of Kubernetes or web applications, URL routing determines how HTTP requests are mapped to specific services or endpoints, ensuring proper handling and response.
Nst
North-south traffic
North-south traffic refers to network traffic flowing into and out of a data center or network boundary. It typically involves communication between external clients or users accessing services hosted within the data center.
Ewt
East-west traffic
East-west traffic refers to network traffic flowing horizontally within a data center or cloud environment, typically between servers, virtual machines, or containers. Unlike north-south traffic, which involves communication between external clients and internal resources, east-west traffic occurs entirely within the confines of the data center infrastructure, facilitating inter-service communication and data exchange.
Tdpt
Traffic distribution by protocol type
Traffic distribution by protocol type is the process of directing network traffic based on the specific communication protocols used, such as HTTP, HTTPS, TCP, or UDP. It involves analyzing incoming traffic packets and routing them to appropriate destinations or services based on predefined rules and policies, ensuring efficient and optimized network utilization.
Sg
Service graph
A service graph is a visual representation of the relationships and dependencies between different components or microservices within a system or application architecture. It illustrates how services interact with each other and helps in understanding the flow of data and requests.
Ci/Cd
Continuous integration/continuous deployment
Ci/Cd, or Continuous Integration/Continuous Deployment, is a software development practice aimed at automating the process of code integration, testing, and deployment. Cloud-native architectures often involve numerous small services that need to be deployed and updated independently. CI/CD enables rapid iteration and deployment of microservices and containerized applications.
Acd
Automated canary deployment
Automated canary deployment is a technique used in continuous delivery practices to gradually roll out new software versions to a subset of users or servers before deploying them widely. It involves automated processes for monitoring performance and user feedback, enabling safe and controlled deployment while minimizing the impact of potential issues.
M
Metrics
Quantifiable data points that provide insights into the performance and behavior of systems, applications, or services, aiding in monitoring and troubleshooting.
E
Events
Deviations or failures within a system that can impact its functionality, often recorded and analyzed to identify and resolve issues.
L
Logs
Logs are records or files that capture events, activities, or transactions occurring within a system, application, or network. They provide a chronological account of actions taken, errors encountered, and other relevant information, aiding in troubleshooting, performance analysis, security audits, and compliance verification within IT environments.
T
Traces
Traces refer to detailed records or data captures of specific actions, transactions, or events within a system or application. They provide granular insights into the execution path, performance metrics, and interactions between components, facilitating troubleshooting, optimization, and analysis of complex systems and processes within IT environments.
Rt
Response time
Response time measures the duration it takes for a system or application to respond to a request or operation, indicating its performance and user experience.
Ss
Service status
The current operational state of a service or component that indicates whether it is functioning as expected or is experiencing issues.
Gi
Gateway insight
Gateway insight provides visibility and analytics on user behavior and security threats within the enterprise network. It monitors user access, application usage, and security events, allowing administrators to detect and mitigate potential risks while ensuring compliance and enhancing network security posture.
Aahm
Application & ADC health monitoring
A diagnostic process that involves continuously checking the status and performance of servers and resources to identify application health issues to ensure their availability and reliability. It’s significant as any unnecessary unplanned downtime or increased latencies because an application failed or underperformed can have cascading effects on the entire offering.
Pl
p99 latency
P99 latency, a performance metric, represents the latency value below which 99% of requests fall. It provides insight into the worst-case performance experienced by users, helping identify outliers and potential issues that may impact overall application performance and user experience.
Apii
API insights
API Insights refers to the analysis and monitoring of application programming interfaces (APIs) to gain insights into API usage, performance, and errors. It helps organizations understand how APIs are being utilized, identify bottlenecks or inefficiencies, and optimize API performance for improved application functionality and user experience.
Noe
Network observability exporter
An observability exporter is a component or tool that facilitates the extraction and export of observability data for analysis and visualization in external systems or platforms.
Learn how NetScaler can help you automate application delivery and security at scale.