ADSL (Asymmetric Digital Subscriber Line)
Internet connectivity where bandwidth is divided to favour download speeds rather than upload.
A content delivery network or content distribution network is a system of computers containing copies of data, placed at various points in a network so as to maximise bandwidth for access to the data from clients throughout the network.
A Codec is a device or computer program capable of encoding and/or decoding a digital data stream or signal.
The contention of a connection is the ratio of the potential maximum demand to the actual available bandwidth. The higher the contention ratio, the greater the number of users that may be trying to use the actual bandwidth at any one time and, therefore, the lower the effective bandwidth offered, especially at peak times.
The raw uncompressed digital frames captured or created by a Production.
DNS (Domain Name System)
Internet system to translate web domain names into IP addresses.
DNS lookup tables
Forward DNS lookup is using an Internet domain name to find an IP address.
The process used when working with media as individual files as opposed to a continuous stream like video or film.
File Transfer Protocol – ubiquitous protocol for making file transfers.
Hypertext Transfer Protocol Secure (HTTPS) is a combination of the Hypertext Transfer Protocol with the SSL/TLS protocol to provide encrypted communication and secure identification of a network web server.
Local Area Network
Network Latency is usually measured as the Round Trip Time (RTT) taken for a packet to pass from one point on a network to another and back again. This increases with the physical distance between two points.
Linux Operating System refers to the family of Unix-like computer operating systems using the Linux kernel. Linux can be installed on a wide variety of computer hardware, ranging from mobile phones, tablet computers and video game consoles, to mainframes and supercomputers.
Open Source Software
Open-source software (OSS) is computer software that is available in source code form for which the source code and certain other rights normally reserved for copyright holders are provided under a software license that permits users to study, change, improve and at times also to distribute the software.
Point of Presence. An artificial demarcation point or interface point between communications entities.
Equipment in a standby configuration that can take over from active equipment in the case of a hardware failure.
A Resilient System is one that will react to a failure and maintain operation without any impact on the use of the system. In networking terms, this will make use of Redundant Equipment and geographically diverse circuits into a building.
Software as a Service – sometimes referred to as “software on demand” – software that is deployed over the Internet and/or is deployed to run behind a firewall on a local area network or personal computer.
SDSL ( Symmetric Digital Subscriber Line)
Internet connectivity where bandwidth is divided equally between download and upload.
SFTP (Secure File Transfer Protocol) – a network protocol that provides file access, file transfer and file management functionality over any reliable data system.
An encrypted alternative to FTP (File Transfer Protocol). It uses SSH to transfer files and encrypts both commands and data thus protecting both the security of your network and your content from risk of interception.
The Internet Protocol Suite is the set of communication protocols used for the Internet and other similar networks. It is commonly also known as TCP/IP, named from two of the most important protocols in it: the Transmission Control Protocol (TCP) and the Internet Protocol (IP), which were the first two networking protocols defined in this standard.
Company that provides telecommunications services such as telephony and data communications.
Network topology is the layout pattern of interconnections of the various elements (links, nodes, etc.) of a computer network.
A virtual private network (VPN) is a computer network that uses a public telecommunication infrastructure to provide remote offices or individual users with secure access to their organisation’s network.
An SSL VPN (Secure Sockets Layer virtual private network) is a form of VPN that can be used with a standard Web browser. In contrast to the traditional Internet Protocol Security (IPsec) VPN, an SSL VPN does not require the installation of specialised client software on the end user’s computer.
Internet Protocol Security (IPsec) is a protocol suite for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session.
A wide area network (WAN) is a computer network that covers a broad area (i.e., any network whose communications links cross metropolitan, regional, or national boundaries)….