A |
|
Advanced Encryption Standard |
The AES algorithm is a symmetric grouped password algorithm and one of the most popular symmetric key encryption algorithms released by the U.S. National Institute of Standards and Technology (NIST) on November 26, 2001. It is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST). It supersedes the Data Encryption Standard (DES). AES adopts a symmetric-key algorithm for both encrypting and decrypting the data, where the block size is 128 bits, and the key size is 128 bits, 192 bits, or 256 bits. |
AES |
See Advanced Encryption Standard. |
API |
See application programming interface. |
application programming interface |
An application programming interface is a particular set of rules and specifications that are used for communication between software programs. |
security policy |
A security policy is a set of rules for monitoring the behaviors of terminal users or checking the weaknesses of terminal hosts. Security policies can be divided into policies for terminal security management and terminal user behavior management. The application of security policies improves the security of terminal hosts and regulates terminal users' behaviors of using network resources. |
Secure Shell (SSH) |
A standard network protocol that allows users to establish a secure channel between a local computer and a remote computer. When a user remotely logs in to an insecure network, the SSH feature provides secure information protection and powerful authentication functions to protect the network against attacks such as IP address spoofing and simple password interception. |
Secure File Transfer Protocol (SFTP) |
A network protocol designed to provide secure file transfer over SSH. |
B |
|
whitelist |
A list or register of items that, for one reason or another, are being provided a particular privilege, service, mobility, access, or recognition. |
report |
A tool that displays data in a specific format to intuitively present service information. |
B/S |
Browser/Server |
protected object |
An object that is under disaster recovery protection. It can be a database, file system, virtual machine, or storage LUN. |
protected group Protection policy |
One or multiple sets of protected objects. A protection policy defines the protection mode and scheduling policy that the DR management system uses to protect objects. It is generated automatically when a protected group is created. |
local backup |
A kind of file system backup methodology that creates backups (snapshots) for the file system |
backup server |
A server that runs the backup software, schedules and monitors backup and recovery jobs, manages backup storage and production system, and receives and responds to user requests. A backup server also provides the functions of a backup proxy. |
B/S |
Browser/Server |
baud rate |
The maximum rate of signal state changes per second on a communications circuit. Generally, the transmission line uses only two signal states, making the baud rate equal to the number of bits per second that can be transferred. The underlying transmission technique may use some of the bandwidth, so it may not be the case that user data transfers at the line's specified bit rate. |
patch |
An independent software unit used for fixing the bugs in software. |
independent transmission (IT) |
A transmission mode in which different RATs connect to the transport network through different independent transmission ports without sharing the transmission resources. |
C |
|
operation log |
A list of information about operation events. |
timeout interval |
For process control, the time the server waits, when a command cannot be successfully completed, before canceling the command. |
Comma Separated Values |
A CSV file is a text file that stores data, generally used as an electronic table or by the database software. |
CSV |
See comma separated values. |
D |
|
Data Encryption Standard |
A specification for encryption of computer data developed by IBM and adopted by the U.S. government as a standard in 1977. DES uses a 56-bit key. |
DES |
See Data Encryption Standard. |
Internet Protocol version 4 (IPv4) |
The current version of the Internet Protocol (IP). IPv4 uses 32 bytes as host addresses. Each address belongs to class A, B, C, D, or E. An address is a 32-bit code and is usually represented by four dotted decimal numbers. Each IPv4 address consists of a network number, an optional subnetwork number, and a host number. The network and subnetwork numbers together are used for routing, and the host number is used to address an individual host within the network or subnetwork. |
Internet Protocol version 6 (IPv6) |
An update version of IPv4, which is designed by the Internet Engineering Task Force (IETF) and is also called IP Next Generation (IPng). It is a new version of the Internet Protocol. It is a new version of the Internet Protocol. The difference between IPv6 and IPv4 is that an IPv4 address has 32 bits while an IPv6 address has 128 bits. |
electronic serial number (ESN) |
A 32-bit number assigned by the mobile station manufacturer, uniquely identifying the mobile station equipment. |
disaster recovery site (DR site) |
A site where a disaster recovery system resides and provides data backup and disaster recovery for a production system. It can recover services at a production site in the event of a disaster. |
DNS |
See domain name service. |
Domain Name Service |
A hierarchical naming system for computers, services, or any resource connected to the Internet or a private network. It associates various information with domain names assigned to each of the participants. The DNS distributes the responsibility of assigning domain names and mapping those names to IP addresses by designating authoritative name servers for each domain. |
comma separated values (CSV) |
A CSV file is a text file that stores data, generally used as an electronic table or by the database software. |
DR site |
See disaster recovery site. |
E |
|
ElasticSearch |
ElasticSearch is a search server based on Lucene. It provides a distributed multi-tenant-capable full-text search engine based on a RESTful web interface. ElasticSearch is developed in Java and is released as open source under the terms of Apache. It is designed for cloud computing to facilitate real-time search. It runs stably and reliably, responds quickly, and is easy to install. |
Electronic Serial Number |
A 32-bit number assigned by the mobile station manufacturer, uniquely identifying the mobile station equipment. |
ESN |
See electronic serial number. |
F |
|
reverse proxy |
A proxy server receives a connection request from the Internet, forwards the request to a server on the internal network, and sends back the result from the server to the client that initiates the connection request on the Internet. The proxy server externally functions as a server, and this process is called reverse proxy. |
firewall |
A combination of components set between different networks or network security domains. The firewall monitors, restricts, and changes the data traffic across the firewall to shield the internal information, structure, and running status from external network users, ensuring network security. |
FIP |
See floating IP address. |
floating IP address |
An IP address that a high availability (HA) system uses to communicate with the external system. The active and standby nodes have an IP address each. For example, the active node uses IP address 1, and the standby node uses IP address 2. During communication with an external client, another IP address (for example, IP address 3) is used. IP address 3 is bound to the NIC of the active node (the active node has two IP addresses 1 and 3). The external client communicates with the active node which has IP address 3. The standby server has only IP2, therefore, it does not provide services to the external client. When an active/standby switchover occurs, the active server releases IP3, and IP3 is bound to the network adapter of the standby server. This is called floating. |
floating IP address |
An IP address used by a two-node cluster to communicate with external systems. The active and standby nodes have an IP address each. For example, the active node uses IP address 1, and the standby node uses IP address 2. During communication with an external client, another IP address (for example, IP address 3) is used. IP address 3 is bound to the NIC of the active node (the active node has two IP addresses 1 and 3). The external client communicates with the active node which has IP address 3. The standby node has only IP address 2 and does not provide services externally. When an active/standby switchover occurs, IP address 3 is released from the original active node and bound to the NIC of the new active node (original standby node). That is why the IP address is called a floating IP address. |
load balancing |
The distribution of activity across two or more servers or components in order to avoid overloading any one with too many requests or too much traffic. |
Huawei Distributed Block Storage |
Huawei Distributed Block Storage is the distributed block storage software designed to meet the storage infrastructure requirements of cloud computing data centers. It can virtualize local solid state disks (SSDs), hard disk drives (HDDs), and other storage media on x86 servers into a large-scale storage pool using the distributed technology. Huawei Distributed Block Storage provides standard Small Computer System Interfaces (SCSIs) and Internet Small Computer Systems Interfaces (iSCSIs) for upper-layer applications and VMs. |
G |
|
Advanced Encryption Standard (AES) |
The AES algorithm is a symmetric grouped password algorithm and one of the most popular symmetric key encryption algorithms released by the U.S. National Institute of Standards and Technology (NIST) on November 26, 2001. It is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST). It supersedes the Data Encryption Standard (DES). AES adopts a symmetric-key algorithm for both encrypting and decrypting the data, where the block size is 128 bits, and the key size is 128 bits, 192 bits, or 256 bits. |
alarm notification |
When an error occurs, the performance measurement system sends performance alarms to the destination (for example, a file and/or fault management system) designated by users. |
alarm dump |
A process of transferring the alarms stored in the system memory to other external devices. |
root certificate |
An unsigned public key certificate or a self-signed certificate that identifies the Root Certificate Authority (CA). A root certificate is part of a public key infrastructure scheme. |
H |
|
background job |
A job that operates without interaction with the user. Usually, its operation will not affect other jobs. In a distributed system, one background job is assigned to as many nodes as possible for concurrent processing to improve the processing efficiency. Generally, background jobs are asynchronous jobs that do not have a demanding requirement on real-time capability, for example, data consistency verification. |
HTTPS |
See Hypertext Transfer Protocol Secure. |
gray release |
In the private cloud scenario of the IT PaaS, gray release is an extension and enhancement of the traditional AB test technology. Gray release scope is determined based on flexible selection policies (such as the user characteristics, quantity, scope, and area). Gray release ensures smooth test and release of software functions with good user experience and overall function stability. |
recovery planning |
The advance planning and preparations that are necessary to minimize loss and to ensure the availability of an organization's critical information systems after a service disruption or a disaster. |
session |
A sequence of requests and responses used by the server to identify a client. Through the session, the server can identify requests from the same customer. |
Hypertext Transfer Protocol Secure |
An HTTP protocol that runs on top of transport layer security (TLS) and Secure Sockets Layer (SSL) for secured transactions. It is used to establish a reliable channel for encrypted communication and secure identification of a network web server. |
I |
|
IBMS |
See Integrated Business Management System. |
Independent Transmission (IT) |
A transmission mode in which different RATs connect to the transport network through different independent transmission ports without sharing the transmission resources. |
IPv4 |
See Internet Protocol version 4. |
IPv6 |
See Internet Protocol version 6. |
IT |
See independent transmission. |
Integrated Business Management System |
Business management platform of the PTT service. It provides a data synchronization interface for the BOSS so that enterprise administrators and members can perform operations such as registration, deregistration, modification, and query. |
Internet Protocol version 4 |
The current version of the Internet Protocol (IP). IPv4 utilizes a 32-bit address which is assigned to hosts. An address belongs to one of five classes (A, B, C, D, or E) and is written as 4 octets separated by periods and may range from 0.0.0.0 through to 255.255.255.255. Each IPv4 address consists of a network number, an optional subnetwork number, and a host number. The network and subnetwork numbers together are used for routing, and the host number is used to address an individual host within the network or subnetwork. |
Internet Protocol version 6 |
An update version of IPv4, which is designed by the Internet Engineering Task Force (IETF) and is also called IP Next Generation (IPng). It is a new version of the Internet Protocol. The difference between IPv6 and IPv4 is that an IPv4 address has 32 bits while an IPv6 address has 128 bits. |
J |
|
planned migration |
Data or application migration from a production site to a disaster recovery site due to planned events such as power supply cutoff, system upgrade, or system maintenance. |
activation |
An operation that enables a registered subscriber to enter the active state and use services provided by a carrier. |
Cluster |
A computer technology that integrates a set of loosely connected servers to work together so that in many respects they can be viewed as a single system. A cluster is used to improve system stability, reliability, data processing capability, or service capability. For example, a cluster is used to reduce single-point failures, share storage resources, load balances, and improve system performance. |
Hypertext Transfer Protocol Secure (HTTPS) |
An HTTP protocol that runs on top of transport layer security (TLS) and Secure Sockets Layer (SSL) for secured transactions. It is used to establish a reliable channel for encrypted communication and secure identification of a network web server. |
Simple Network Management Protocol (SNMP) |
A network management protocol of TCP/IP. This protocol allows remote users to view and modify network element management information. This protocol ensures transmission of management information between any two points. The polling mechanism is adopted to provide basic function sets. According to SNMP, agents, which can be hardware as well as software, can monitor the activities of various devices on the network and report these activities to the network console workstation. The control information about each device is maintained by using a management information block. |
Simple Mail Transfer Protocol (SMTP) |
The TCP/IP protocol which facilitates the transfer of electronic-mail messages, specifies how two systems are to interact, and the format of messages used to control the transfer of electronic mail. |
keyboard, video, and mouse (KVM) |
A hardware device installed in the integrated configuration cabinet. KVM serves as the input and output device for the components inside the cabinet. It consists of a screen, a keyboard, and a mouse. |
K |
|
Kibana |
Kibana is an open-source data visualization plugin for Elasticsearch. You can use Kibana to search, view, and exchange the data stored in Elasticsearch indexes. Kibana easily provides advanced data analysis and visualization by using charts, tables, and maps. |
keyboard, video, and mouse |
A hardware device installed in the integrated configuration cabinet. KVM serves as the input and output device for the components inside the cabinet. It consists of a screen, a keyboard, and a mouse. |
password |
A sequence of characters used to prove one's identity. It is used during a login process and should be highly protected. |
KVM |
See keyboard, video, and mouse. |
L |
|
link status |
The running status of a link, which can be Up, Down, backup, or unknown. |
Logical Volume Manager |
See logical volume manager. |
logical volume manager (LVM) |
Volume management software. It provides the high level disk storage that helps the system administrator allocate storage space for applications and users. Storage volumes under the LVM can be easily changed in size and removed as required. User groups are allowed to manage storage volumes. The administrator is allowed to customize the names of storage volumes. |
LVM |
See logical volume manager. |
O |
|
OMM HA Q Full Building |
A functional component of eReplication, which provides automatic and manual recovery functions. Full data synchronization from the active site to the standby site. |
R |
|
RESTful |
RESTful is a software architecture style rather than a standard. It provides a set of software design guidelines and constraints for designing software for interaction between clients and servers. RESTful software is simpler and more hierarchical, and facilitates the implementation of the cache mechanism. |
S |
|
Secure File Transfer Protocol |
A network protocol designed to provide secure file transfer over SSH. |
Secure Shell |
A standard network protocol that allows users to establish a secure channel between a local computer and a remote computer. When a user remotely logs in to an insecure network, the SSH feature provides secure information protection and powerful authentication functions to protect the network against attacks such as IP address spoofing and simple password interception. |
SFTP |
See Secure File Transfer Protocol. |
production site |
A site where a production system resides. It is a combination of software and hardware (including computing, network, and storage resources) that supports critical services of an enterprise, company, or institute. |
clock source |
A device that provides standard time for the NTP configuration. |
data backup |
A method of copying key data to the backup storage area to prevent data loss in case the original storage area is damaged or a failure occurs. |
data restoration |
A method for retrieving data that is lost due to damage or misoperations. |
Data Encryption Standard (DES) |
A specification for encryption of computer data developed by IBM and adopted by the U.S. government as a standard in 1977. DES uses a 56-bit key. |
digital signature |
A message signed with a sender's private key that can be verified by anyone who has access to the sender's public key. Digital signature gives the receiver the reason to believe the message was sent by the claimed sender. A proper implementation of digital signature is computing a message digest for the message sent from the sender to the receiver, and then signing the message digest. The result is called digital signature and is sent to the receiver together with the original message. |
Simple Mail Transfer Protocol |
The TCP/IP protocol which facilitates the transfer of electronic-mail messages, specifies how two systems are to interact, and the format of messages used to control the transfer of electronic mail. |
Simple Network Management Protocol |
An IETF protocol for monitoring and managing systems and devices in a network. The data being monitored and managed is defined by a MIB. The functions supported by the protocol are the request and retrieval of data, the setting or writing of data, and traps that signal the occurrence of events. |
SMTP |
See Simple Mail Transfer Protocol. |
SNMP |
See Simple Network Management Protocol. |
SSH |
See Secure Shell. |
T |
|
Integrated Business Management System (IBMS) |
Business management platform of the PTT service. It provides a data synchronization interface for the BOSS so that enterprise administrators and members can perform operations such as registration, deregistration, modification, and query. |
topology |
A configuration or layout of a network formed by the connections between devices on one or more local area networks (LANs). |
V |
|
vCenter |
A VM management system provided by VMware. |
VNC |
virtual network controller |
W |
|
network segment |
Part of a network on which all message traffic is common to all nodes; that is, a message broadcast from one node on the segment is received by all other nodes on the segment. |
gateway |
A device that connects two network segments using different protocols. It is used to translate and convert the data in the two network segments using different protocols. |
X |
|
XLOG disk |
Disk where openGauss redo logs are stored, corresponding to the LUN on the storage device. |
system data backup |
Backup of the operating system of the server, which is used to restore the original operating system. |
thread |
A kernel object created by the OS. Creating a thread involves creating a thread object and allocating resources for the thread. |
virtualization |
Virtualization is a technology that virtualizes a computer into multiple logic computers. Multiple logic computers can work on a computer. The operating systems running on these logic computers can be different, and the applications running on these operating systems work independently. Therefore, the working efficiency of the computer is significantly improved. Software virtualization redefines IT resources to implement dynamic allocation, flexible scheduling, and cross-domain sharing of IT resources. This improves IT resource usage, enables IT resources to become social infrastructure, and serves flexible application requirements in various industries. |
virtual machine image |
A VM file image that specifies VM compositions and basic configurations and can be used to create a VM. A VM image contains an operating system, applications, VM configurations (such as VM operating system, disks, CPU kernel quantity, and network adapters) for defining the entire set of virtual hardware, and other software required for service running. |
Y |
|
application programming interface (API) |
An application programming interface is a particular set of rules and specifications that are used for communication between software programs. |
mail server |
In the report system, reports can be forwarded to the external email boxes of users. An email server is a server that sends and receives emails. |
active period |
A specific period in the life cycle of a subscriber account. The subscriber account is in Active state within the active period. A subscriber account enters the Active state after being activated. Subscribers whose accounts are in Active state can use the telecommunications services provided by carriers. |
domain name service (DNS) |
A hierarchical naming system for computers, services, or any resource connected to the Internet or a private network. It associates various information with domain names assigned to each of the participants. The DNS distributes the responsibility of assigning domain names and mapping those names to IP addresses by designating authoritative name servers for each domain. |
threshold |
A limitation on an amount, scale, or level. Changes will occur when a threshold is reached. |
Z |
|
disaster recovery site (DR site) |
A site where a disaster recovery system resides and provides data backup and disaster recovery for a production system. It can recover services at a production site in the event of a disaster. |
site |
A group of IP systems with IP connectivity, which can be achieved independent of SP networks. |
knowledge base |
A knowledge base that is a structured, easy-to-operate, easy-to-use, and comprehensive knowledge cluster, and is an interconnected knowledge set stored, organized, managed, and used on the computer using one or multiple knowledge representation methods aiming to solve problems in one or multiple domains. |
quorum server |
A server that provides arbitration services for clusters or HyperMetro to prevent the resource access conflicts of multiple application servers. |
terminal |
A device that converts voice, sound, text, image, table, data and video from physical display to electronic signals or from electronic signals to physical display. A terminal generates and sends signals (such as telecommunications circuit setup or release) that maintain the normal running state of the telecommunications network, and it receives the call signals of telecommunications switch and transmission. |
host name |
A fully qualified domain name (FQDN) of a functional entity, which is used for routing. It is planned by carriers uniformly. |
dump |
A mechanism of dumping the data in a system to another system or medium, and deleting the dumped data from the original system. |
automatic backup |
A periodic operation of storing data by the system. |
subnet |
A type of smaller network that forms a larger network according to a rule, such as, forming a network according to different districts. This facilitates the management of a large network. In a topology view, these smaller networks are called subnets. |
subnet mask |
The subnet mask is a binary pattern that is stored in the device and is matched with the IP address. A subnet mask is used by the IP protocol to determine to which network segment packets are destined. |