Help Center> >Glossary


    • A

      See Advanced Anti-DDoS

      Abnormal Traffic Inspection & Control System

      The Abnormal Traffic Inspection & Control System (ATIC) consists of a detection center, a cleaning center, and a management center. The detection center detects optical splitting or mirroring traffic. When it detects a traffic abnormality in a defended IP address, it immediately notifies the management center which in turn requests the cleaning center to divert the abnormal traffic.

      Advanced Anti-DDoS

      Advanced Anti-DDoS is an advanced defense service based on anti-DDoS traffic cleaning devices and a big data operation platform. It hides and protects users' source sites by forwarding traffic.


      See Abnormal Traffic Inspection & Control System


      • B

        See Border Gateway Protocol

        Border Gateway Protocol

        The Border Gateway Protocol (BGP) is an interautonomous system routing protocol running over TCP. A BGP system is used to exchange routing information with another BGP system.


        • D

          See Distributed Denial of Service

          Distributed Denial of Service

          In a Distributed Denial of Service (DDoS) attack, the attacker uses a multitude of compromised systems to attack a single target or multiple targets. Use of many compromised computers increases the power of the attack.


          See domain name server

          domain name server

          A domain name server (DNS) is a functional entity in the TCP/IP network. With deployment of the DNS, subscribers can access related servers using corresponding domain names. In the TCP/IP network, a domain name maps an IP address. Domain names are easier to remember but servers in the network communicate with each other using IP addresses. Therefore the DNS is used to convert domain names to corresponding IP addresses.


          • L
            Linux Virtual Server

            The Linux Virtual Server (LVS) is a virtual server cluster used to balance loads among servers. Working in the network layer, it can be used to implement high-performance, high-availability server cluster technologies.


            See Linux Virtual Server


            • N

              See Network Address Translation

              Network Address Translation

              By Network Address Translation (NAT), private IP addresses are translated into public ones to allow users who only have private IP addresses to access the Internet, thereby relieving the impact of lack of IPv4 addresses.


              • O
                origin server

                An origin server is a server where users' services are running.

                origin server IP address

                An origin server IP address is a public IP address used by a user's server to provide services.


                • R
                  retrieval IP address

                  In addition to protecting origin servers, Advanced Anti-DDoS provides proxy IP addresses for origin servers, which are called retrieval IP addresses. From origin servers' perspective, traffic returned to your users is all sent from the retrieval IP addresses.


                  • T

                    See Transmission Control Protocol

                    Transmission Control Protocol

                    According to the RFC 793 definition of the Internet Engineering Task Force (IETF), the Transmission Control Protocol (TCP) is a reliable transmission-layer protocol oriented to connections and based on byte streams.


                    • U

                      See User Datagram Protocol

                      User Datagram Protocol

                      The User Datagram Protocol is a connectionless transmission-layer protocol that provides transaction-oriented transmission service of simple but unreliable information. IETF RFC 768 is the official specifications of UDP. The protocol ID of UDP in IP packets is 17.