Glossary
ARS
Automatic Relay Selector is a mechanism that automatically selects the best relay to get a message or connection across.
Cluster
Server group that works together to distribute load, high availability and resilience.
Imagine
Here we talk about a system image or snapshot (disk image) of a workstation or server containing OS and software. It's used for quick deployments or restorations.
Logs
It's also called Journalization, it's a mechanism that records system events, errors, access, user actions. Very useful for audits and security.
OR
Organizational unit is a hierarchical structure in a directory (e.g. LDAP) that is used to organize machines and users.
Package
It is a set of files and resources that contain an app ready to be installed and configured on a computer or server. Packages are in deposits and are managed by package managers.
P.M.A.D.
Remote control
Relay
The relay is a component that allows messages to be passed between different points of the network.
Rules
A rule is a set of criteria to determine which relays or server should be used.
XMPP
XMPP means Extensible Messaging and Presence Protocol and is used for instant messaging, presence and real-time communication.
Conditional Grafcet
Planning method based on GRAFCET (Prophet Functional Control Step/Transition), used to automate action sequences (such as software deployment or script execution) according to specific conditions. Each step only executes if defined conditions are met, allowing dynamic and intelligent process management.
Unicast
Network communication mode where only one source sends data to a single destination. Used for point-to-point transmissions.
Multicast
Network communication mode where only one source sends data simultaneously to several specific destinations, without sending separate copies to each receiver.
VPN (Virtual Private Network)
Virtual private network to create a secure and encrypted connection between a user and a network, often via the Internet. It protects the data, hides the IP address and guarantees confidentiality.
SSH (Security Shell)
Secure communication protocol to establish a remote encrypted and authenticated connection to access a system and execute commands. Used mainly for server administration and secure file transfer.
Wake-on-LAN, WOL network alarm
Functionality allowing to start a remote computer via a network, sending a special package calledMagic Packet containing the MAC address of the target machine. Used for remote administration and machine management without having to turn them on manually.