2N / N+1 / N+2
Authentication, authorization, and accounting (AAA) is a term for a framework for intelligently controlling
access to computer resources, enforcing policies, auditing usage, and providing the information necessary to
bill for services. These combined processes are considered important for effective network management and security.
Authentication, authorization, and accounting activities are conducted through three
data services – a local security database, TACACS+ servers, and RADIUS servers.
AHJ (Authority Having Jurisdiction)
AIM (Automated Infrastructure Management)
ANSI (American National Standards Institute)
Blank panels cover open areas on an installed rack face, providing a clean, professional appearance. Blank panels also serve an essential thermal management function by blocking unwanted airflow.
In telecommunications, a campus is a physically contiguous association of locations such as several adjacent office buildings. Typically, such areas require one or more local area networks and bridging, routing, and aggregation equipment based on situational needs.
Ceph is a Distributed Object Storage System (Engl. Storage) designed to achieve excellent performance and a high availability and reliable system. In addition, it is extremely scalable or expandable to the level of Exabyte.
CER (Central equipment room)
Colocation represents one of the data centre’s fundamental services. The service implies the leasing of a complete rack or as per unit height (U), as well as the leasing of a private cage.
CP (Control plane)
CPE (Customer-premises equipment)
EF (Entrance Facility)
ER (Equipment Room)
File systems are used to control how data is stored and retrieved from a data storage device. Without a file system, the information stored on the storage device was a great entity without any means of differentiating the various pieces of information.
GE (Grounding Equalizer)
High- availability (HA)
Host Bus Adapter
HDD (spining drive) The hard disk is a data storage device (for read and write). Unlike the operating memory, the data recorded on the drive remains preserved even after the computer is shut down. The basic parts of the disc are Magnets, Magnetic Head, Control Mechanism, Head Bracket and Axle.
Hypervisor is a computer software or hardware that creates and runs virtual servers. There are two types of hypervisor: native or host. Native hypervisors are operating systems with a specific virtualization purpose, while host hypervisor are applications that are running on standard operating systems.
IDC (Insulation-displacement contact)
LLDP is a discovery protocol that allows devices to advertise information about themselves to peer
devices that are on the same physical LAN and store information about the network. LLDP allows a
device to learn higher layer management reachability and connection endpoint information from
MDA (Main Distribution Area)
NFS - Network File System (NFS) provides a transparent remote access shared online resources. The NFS protocol was created to be transmitted to different platforms, operating systems, network architecture, and transport protocols. Portability is achieved through the RPC (Remote Procedure Call) primitives located on top of XDR (eXternal Day Representation) layer. Implementations exist for many platforms, from personal to supercomputers.
Optical fiber cable
A power distribution unit (PDU) is a type of electrical component that distributes and manages electricity supply to computers, servers and networking devices within a data center environment. It provides a central unit to control and distribute electricity across the data center components. Power distribution units are also known as main distribution units (MDU).
Ping is a network diagnostic tool used primarily to test the connectivity between two nodes or devices. To ping a destination node, an Internet Control Message Protocol (ICMP) echo request packet is sent to that node. If a connection is available, the destination node responds with an echo reply. Ping calculates the round-trip time of the data packet's route from its source to the destination and back, and determines whether any packets were lost during the trip.
Power generator is multiple assembly of devices connected to one unit. Usually they are intended to convert one form of energy to another. For example, the diesel aggregate as a basic or reserve source of electricity is composed of a Diesel engine and an electric generator. They are usually used to handle power outage in data center.
RAID (redundant array of independent disks) is a data storage virtualization technology that combines multiple physical drives to a single logical drive with the purpose of redundancy, performance improvement, or both. There are multiple RAID schemes with different goals, and some of the more popular are: RAID 1, RAID 5, RAID 6, and RAID 10.
Secure Shell (SSH) is a cryptographic protocol that is used to create secure channels over insecure networks (eg. Internet) using a client-server architecture. The most common use is to securely connect to remote devices. It is a substitute for an insecure telnet protocol.
sFlow is a multi-vendor sampling technology that continuously monitors application level traffic flow at
wire speed simultaneously on all interfaces. sFlow provides gigabit speed quantitative traffic
measurements without impacting network performance.
Solid State Drive
SDD (Solid State Drive) are disk devices that, unlike hard drives (HDDs), do not contain mechanical moving parts that read and write data, but have a NAND flash memory mounted on a PCB.
The Telecommunications Industry Association (TIA) is a trade association which is accredited by the American National Standards Institute (ANSI) in order to develop industry standards for information and communication technologies (ICT) products such as cellular towers, data terminals, VoIP devices, satellites, telephone terminal equipment and many more. TIA has members from all over the industry and currently represents nearly 400 different companies.
Telecommunications Main Grounding Busbar serves as the dedicated extension of the building grounding electrode system for the telecommunications infrastructure. It also serves as the central attachment point for the telecommunications bonding backbone (TBB) and equipment. There is typically 1 TMGB per building.
A virtual local area network (VLAN) allows a group of devices to communicate as if they were in the
same network regardless of their physical location. VLANs are layer 2 structures based on the 802.1Q
standard. VLANs define layer 2 broadcast domains in a layer 2 network, in which each device can receive
broadcast frames sent by any other within the domain.
Virtual Extensible LAN (VXLAN) is a networking technology that encapsulates MAC-based Layer 2
Ethernet frames within Layer 3 UDP packets to aggregate and tunnel multiple layer 2 networks across
a Layer 3 infrastructure. VXLAN scales up to 16 million logical networks and supports layer 2
adjacency across IP networks. Multicast transmission architecture is used for broadcast, multicast,
and unknown unicast traffic.
802.11 - first WLAN standard, maximum network bandwidth of 2 Mbps – too slow for most applications.
802.11b - supports bandwidth up to 11 Mbps, comparable to traditional Ethernet.
802.11a - supports bandwidth up to 54 Mbps and signals in a regulated frequency spectrum around 5 GHz.
802.11g - supports bandwidth up to 54 Mbps, and it uses the 2.4 GHz frequency for greater range.
802.11n - providing for up to 300 Mbps of network bandwidth. It can be used in the 2.4 GHz or 5 GHz frequency bands.
802.11ac - offers backward compatibility to 802.11b/g/n and bandwidth rated up to 1300 Mbps on the 5 GHz band