📑System

  • CDN (Content Delivery Network): A system of distributed servers that deliver web content and pages to a user based on the geographic locations of the user, the origin of the web page, and a content delivery server. CDNs are crucial for fast delivery of Internet content including HTML pages, javascript files, stylesheets, images, and videos.

  • SSL/TLS (Secure Sockets Layer/Transport Layer Security): Protocols used for securing communications between web browsers and servers by encrypting the data exchanged. These protocols are fundamental for ensuring privacy, data integrity, and authentication in web services.

  • HTTP/2 and HTTP/3: Versions of the Hypertext Transfer Protocol, with HTTP/2 and HTTP/3 offering significant improvements over HTTP/1.x in terms of efficiency, reduced latency, and enhanced security. These protocols are crucial for modern web applications, providing faster and more reliable connections.

  • WAF (Web Application Firewall): A security system that monitors, filters, and blocks HTTP traffic to and from a web application. It typically protects web applications from attacks such as SQL injection, cross-site scripting (XSS), and other vulnerabilities.

  • DDoS Mitigation: Techniques and processes used to protect a target from distributed denial of service attacks. DDoS mitigation involves analyzing incoming traffic to separate human users from bots, then filtering or rerouting malicious traffic to protect servers and ensure service continuity.

  • API Security: Practices and technologies used to protect application programming interfaces (APIs) from malicious attacks. This involves securing the communication between different software intermediaries and ensuring that only authorized parties can access the API.

  • Zero Trust Security Model: A security concept centered on the belief that organizations should not automatically trust anything inside or outside their perimeters and instead must verify anything and everything trying to connect to its systems before granting access. This model is increasingly relevant in decentralized systems like Dexflare.

  • Edge Computing: A distributed computing paradigm that brings computation and data storage closer to the location where it is needed, to improve response times and save bandwidth. In web services, edge computing can be used to process data at the edge of the network, near users, for faster content delivery and improved user experience.

  • End-to-End Encryption (E2EE): A method of secure communication that prevents third parties from accessing data while it's transferred from one end system or device to another. In web services, E2EE ensures that data, including messages, files, and even voice calls, are encrypted while passing through intermediary servers, protecting it from interception and eavesdropping.

  • Public Key Infrastructure (PKI): A set of roles, policies, hardware, software, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption. The purpose of PKI is to facilitate the secure electronic transfer of information for a range of network activities such as e-commerce, internet banking, and confidential email.

  • P2P (Peer-to-Peer) Network: A decentralized communications model in which each party has the same capabilities and either party can initiate a communication session. In the context of Dexflare, it refers to the system that enables the exchange or leasing of resources directly between users without the need for a centralized intermediary.

  • Latency: The delay before a transfer of data begins following an instruction for its transfer. Low latency is crucial for real-time applications such as video streaming and online gaming, which are sensitive to delays.

  • Node: In the context of blockchain, a node is any computing device that participates in the blockchain network by validating and relaying transactions. Nodes support the network through validation and by maintaining a copy of a blockchain or a segment of it.

Last updated