| < draft-ietf-userglos-glossary2-00.txt | draft-ietf-userglos-glossary2-01.txt > | |||
|---|---|---|---|---|
| draft-ietf-userglos-glossary2-00.txt G. Malkin / Xylogics, Inc. | draft-ietf-userglos-glossary2-01.txt G. Malkin / Xylogics, Inc. | |||
| Obsoletes RFC 1392 (FYI 18) February 1996 | Obsoletes RFC 1392 (FYI 18) May 1996 | |||
| Internet Users' Glossary | Internet Users' Glossary | |||
| Status of this Memo | Status of this Memo | |||
| This document is an Internet-Draft. Internet-Drafts are working | This document is an Internet-Draft. Internet-Drafts are working | |||
| documents of the Internet Engineering Task Force (IETF), its areas, | documents of the Internet Engineering Task Force (IETF), its areas, | |||
| and its working groups. Note that other groups may also distribute | and its working groups. Note that other groups may also distribute | |||
| working documents as Internet-Drafts. | working documents as Internet-Drafts. | |||
| skipping to change at page 1, line 36 ¶ | skipping to change at page 1, line 36 ¶ | |||
| Abstract | Abstract | |||
| There are many networking glossaries in existence. This glossary | There are many networking glossaries in existence. This glossary | |||
| concentrates on terms which are specific to the Internet. Naturally, | concentrates on terms which are specific to the Internet. Naturally, | |||
| there are entries for some basic terms and acronyms because other | there are entries for some basic terms and acronyms because other | |||
| entries refer to them. | entries refer to them. | |||
| Acknowledgements | Acknowledgements | |||
| This document is the work of the User Glossary Working Group of the | This document is the work of the User Glossary Working Group of the | |||
| User Services Area of the Internet Engineering Task Force. | User Services Area of the Internet Engineering Task Force. I would | |||
| especially like to thank Ryan Moats/InterNIC for his careful review | ||||
| and many contributions to this document. | ||||
| Table of Contents | Table of Contents | |||
| non-letter . . 3 I . . . . . . . 26 R . . . . . . . 45 | non-letter . . 3 I . . . . . . . 26 R . . . . . . . 46 | |||
| A . . . . . . . 3 J . . . . . . . 33 S . . . . . . . 48 | A . . . . . . . 3 J . . . . . . . 33 S . . . . . . . 49 | |||
| B . . . . . . . 8 K . . . . . . . 33 T . . . . . . . 51 | B . . . . . . . 8 K . . . . . . . 33 T . . . . . . . 52 | |||
| C . . . . . . . 11 L . . . . . . . 33 U . . . . . . . 54 | C . . . . . . . 11 L . . . . . . . 33 U . . . . . . . 55 | |||
| D . . . . . . . 15 M . . . . . . . 35 V . . . . . . . 55 | D . . . . . . . 15 M . . . . . . . 35 V . . . . . . . 57 | |||
| E . . . . . . . 18 N . . . . . . . 38 W . . . . . . . 56 | E . . . . . . . 18 N . . . . . . . 39 W . . . . . . . 57 | |||
| F . . . . . . . 20 O . . . . . . . 42 X . . . . . . . 57 | F . . . . . . . 20 O . . . . . . . 43 X . . . . . . . 59 | |||
| G . . . . . . . 23 P . . . . . . . 42 Y . . . . . . . 58 | G . . . . . . . 23 P . . . . . . . 43 Y . . . . . . . 60 | |||
| H . . . . . . . 24 Q . . . . . . . 45 Z . . . . . . . 58 | H . . . . . . . 24 Q . . . . . . . 46 Z . . . . . . . 60 | |||
| References . . . . . . . . . . . . . . . . . . . . . . . . . . 59 | References . . . . . . . . . . . . . . . . . . . . . . . . . . 61 | |||
| Security Considerations . . . . . . . . . . . . . . . . . . . . 60 | Security Considerations . . . . . . . . . . . . . . . . . . . . 62 | |||
| Editors' Addresses . . . . . . . . . . . . . . . . . . . . . . 60 | Editors' Addresses . . . . . . . . . . . . . . . . . . . . . . 62 | |||
| Glossary | Glossary | |||
| 10Base2 | 10Base2 | |||
| A physical layer communications specification for 10Mbps, baseband | A physical layer communications specification for 10Mbps, baseband | |||
| data transmission over a coaxial cable (Thinnet) with a maximum | data transmission over a coaxial cable (Thinnet) with a maximum | |||
| cable segment length of 200 meters. | cable segment length of 200 meters. | |||
| 10Base5 | 10Base5 | |||
| A physical layer communications specification for 10Mbps, baseband | A physical layer communications specification for 10Mbps, baseband | |||
| skipping to change at page 4, line 11 ¶ | skipping to change at page 4, line 11 ¶ | |||
| syntax. This language is also used to encode SNMP packets. ASN.1 | syntax. This language is also used to encode SNMP packets. ASN.1 | |||
| is defined in ISO documents 8824.2 and 8825.2. See also: Basic | is defined in ISO documents 8824.2 and 8825.2. See also: Basic | |||
| Encoding Rules. | Encoding Rules. | |||
| Acceptable Use Policy (AUP) | Acceptable Use Policy (AUP) | |||
| Many transit networks have policies which restrict the use to | Many transit networks have policies which restrict the use to | |||
| which the network may be put. For example, some networks may only | which the network may be put. For example, some networks may only | |||
| be used for non-commercial purposes. Some AUPs limit the type of | be used for non-commercial purposes. Some AUPs limit the type of | |||
| material which can be made available to the public (e.g., | material which can be made available to the public (e.g., | |||
| pornographic material). Enforcement of AUPs varies with the | pornographic material). Enforcement of AUPs varies with the | |||
| network. See also: transit network. | network. See also: netiquette. | |||
| Access Control List (ACL) | Access Control List (ACL) | |||
| Most network security systems operate by allowing selective use of | Most network security systems operate by allowing selective use of | |||
| services. An Access Control List is the usual means by which | services. An Access Control List is the usual means by which | |||
| access to, and denial of, services is controlled. It is simply a | access to, and denial of, services is controlled. It is simply a | |||
| list of the services available, each with a list of the hosts | list of the services available, each with a list of the hosts | |||
| permitted to use the service. | permitted to use the service. | |||
| ACK | ACK | |||
| See: Acknowledgment | See: Acknowledgment | |||
| skipping to change at page 4, line 36 ¶ | skipping to change at page 4, line 36 ¶ | |||
| Acknowledgement. | Acknowledgement. | |||
| [Source: NNSC] | [Source: NNSC] | |||
| ACL | ACL | |||
| See: Access Control List | See: Access Control List | |||
| AD | AD | |||
| See: Administrative Domain | See: Administrative Domain | |||
| address | address | |||
| There are three types of addresses in common use within the | There are four types of addresses in common use within the | |||
| Internet. They are email address; IP, internet or Internet | Internet. They are email address; IP, internet or Internet | |||
| address; and hardware or MAC address. See also: email address, IP | address; hardware or MAC address; and URL. See also: email | |||
| address, internet address, MAC address. | address, IP address, internet address, MAC address, Uniform | |||
| Resource Locator. | ||||
| address mask | address mask | |||
| A bit mask used to identify which bits in an IP address correspond | A bit mask used to identify which bits in an IP address correspond | |||
| to the network and subnet portions of the address. This mask is | to the network and subnet portions of the address. This mask is | |||
| often referred to as the subnet mask because the network portion | often referred to as the subnet mask because the network portion | |||
| of the address (i.e., the network mask) can be determined by the | of the address (i.e., the network mask) can be determined by the | |||
| encoding inherent in an IP address. See also: Classless Inter- | encoding inherent in an IP address. See also: Classless Inter- | |||
| domain Routing. | domain Routing. | |||
| address resolution | address resolution | |||
| Conversion of an internet address into the corresponding physical | Conversion of a network-layer address (e.g. IP address) into the | |||
| address. | corresponding physical address (e.g., MAC address). See also: IP | |||
| address, MAC address. | ||||
| Address Resolution Protocol (ARP) | Address Resolution Protocol (ARP) | |||
| Used to dynamically discover the low level physical network | Used to dynamically discover the low level physical network | |||
| hardware address that corresponds to the high level IP address for | hardware address that corresponds to the high level IP address for | |||
| a given host. ARP is limited to physical network systems that | a given host. ARP is limited to physical network systems that | |||
| support broadcast packets that can be heard by all hosts on the | support broadcast packets that can be heard by all hosts on the | |||
| network. See also: proxy ARP. | network. See also: proxy ARP, Reverse Address Resolution | |||
| Protocol. | ||||
| Administrative Domain (AD) | Administrative Domain (AD) | |||
| A collection of hosts and routers, and the interconnecting | A collection of hosts and routers, and the interconnecting | |||
| network(s), managed by a single administrative authority. | network(s), managed by a single administrative authority. | |||
| Advanced Research Projects Agency (ARPA) | Advanced Research Projects Agency (ARPA) | |||
| An agency of the U.S. Department of Defense responsible for the | An agency of the U.S. Department of Defense responsible for the | |||
| development of new technology for use by the military. ARPA | development of new technology for use by the military. ARPA | |||
| (formerly known as DARPA, nee ARPA) was responsible for funding | (formerly known as DARPA, nee ARPA) was responsible for funding | |||
| much of the development of the Internet we know today, including | much of the development of the Internet we know today, including | |||
| skipping to change at page 7, line 46 ¶ | skipping to change at page 7, line 48 ¶ | |||
| case, current information can be obtained from the Internet | case, current information can be obtained from the Internet | |||
| Assigned Numbers Authority (IANA). If you are developing a | Assigned Numbers Authority (IANA). If you are developing a | |||
| protocol or application that will require the use of a link, | protocol or application that will require the use of a link, | |||
| socket, port, protocol, etc., please contact the IANA to receive a | socket, port, protocol, etc., please contact the IANA to receive a | |||
| number assignment. See also: Internet Assigned Numbers Authority, | number assignment. See also: Internet Assigned Numbers Authority, | |||
| STD. | STD. | |||
| [Source: STD2] | [Source: STD2] | |||
| Asynchronous Transfer Mode (ATM) | Asynchronous Transfer Mode (ATM) | |||
| A standard which defines high-load, high-speed (1.544Mbps through | A standard which defines high-load, high-speed (1.544Mbps through | |||
| 1.2 Gbps), fixed-size packet (cell) switching with dynamic | 1.2Gbps), fixed-size packet (cell) switching with dynamic | |||
| bandwidth allocation. ATM is also known as "fast packet." | bandwidth allocation. ATM is also known as "fast packet." | |||
| ATM | ATM | |||
| See: Asynchronous Transfer Mode | See: Asynchronous Transfer Mode | |||
| AUP | AUP | |||
| See: Acceptable Use Policy | See: Acceptable Use Policy | |||
| authentication | authentication | |||
| The verification of the identity of a person or process. | The verification of the identity of a person or process. | |||
| skipping to change at page 10, line 5 ¶ | skipping to change at page 10, line 8 ¶ | |||
| binary | binary | |||
| 11001001 | 11001001 | |||
| BIND | BIND | |||
| See: Berkeley Internet Name Domain | See: Berkeley Internet Name Domain | |||
| Birds Of a Feather (BOF) | Birds Of a Feather (BOF) | |||
| A Birds Of a Feather (flocking together) is an informal discussion | A Birds Of a Feather (flocking together) is an informal discussion | |||
| group. It is formed, often ad hoc, to consider a specific issue | group. It is formed, often ad hoc, to consider a specific issue | |||
| and, therefore, has a narrow focus. | and, therefore, has a narrow focus. See also: Working Group. | |||
| Bitnet | Bitnet | |||
| An academic computer network that provides interactive electronic | An academic computer network that provides interactive electronic | |||
| mail and file transfer services, using a store-and-forward | mail and file transfer services, using a store-and-forward | |||
| protocol, based on IBM Network Job Entry protocols. Bitnet-II | protocol, based on IBM Network Job Entry protocols. Bitnet-II | |||
| encapsulates the Bitnet protocol within IP packets and depends on | encapsulates the Bitnet protocol within IP packets and depends on | |||
| the Internet to route them. | the Internet to route them. | |||
| BOF | BOF | |||
| See: Birds Of a Feather | See: Birds Of a Feather | |||
| skipping to change at page 12, line 6 ¶ | skipping to change at page 12, line 11 ¶ | |||
| CERT | CERT | |||
| See: Computer Emergency Response Team | See: Computer Emergency Response Team | |||
| checksum | checksum | |||
| A computed value which is dependent upon the contents of a packet. | A computed value which is dependent upon the contents of a packet. | |||
| This value is sent along with the packet when it is transmitted. | This value is sent along with the packet when it is transmitted. | |||
| The receiving system computes a new checksum based upon the | The receiving system computes a new checksum based upon the | |||
| received data and compares this value with the one sent with the | received data and compares this value with the one sent with the | |||
| packet. If the two values are the same, the receiver has a high | packet. If the two values are the same, the receiver has a high | |||
| degree of confidence that the data was received correctly. | degree of confidence that the data was received correctly. See | |||
| also: Cyclic Redundancy Check. | ||||
| [Source: NNSC] | [Source: NNSC] | |||
| CIDR | CIDR | |||
| See: Classless Inter-domain Routing | See: Classless Inter-domain Routing | |||
| circuit switching | circuit switching | |||
| A communications paradigm in which a dedicated communication path | A communications paradigm in which a dedicated communication path | |||
| is established between two hosts, and on which all packets travel. | is established between two hosts, and on which all packets travel. | |||
| The telephone system is an example of a circuit switched network. | The telephone system is an example of a circuit switched network. | |||
| See also: connection-oriented, connectionless, packet switching. | See also: connection-oriented, connectionless, packet switching. | |||
| skipping to change at page 12, line 44 ¶ | skipping to change at page 12, line 50 ¶ | |||
| A common way to describe the paradigm of many network protocols. | A common way to describe the paradigm of many network protocols. | |||
| Examples include the name-server/name-resolver relationship in DNS | Examples include the name-server/name-resolver relationship in DNS | |||
| and the file-server/file-client relationship in NFS. See also: | and the file-server/file-client relationship in NFS. See also: | |||
| client, server, Domain Name System, Network File System. | client, server, Domain Name System, Network File System. | |||
| CNI | CNI | |||
| See: Coalition for Networked Information | See: Coalition for Networked Information | |||
| Coalition for Networked Information (CNI) | Coalition for Networked Information (CNI) | |||
| A consortium formed by American Research Libraries, CAUSE, and | A consortium formed by American Research Libraries, CAUSE, and | |||
| EDUCOM to promote the creation of, and access to, information | EDUCOM (no, they are not acronyms) to promote the creation of, and | |||
| resources in networked environments in order to enrich scholarship | access to, information resources in networked environments in | |||
| and enhance intellectual productivity. | order to enrich scholarship and enhance intellectual productivity. | |||
| Comite Consultatif International de Telegraphique et Telephonique | Comite Consultatif International de Telegraphique et Telephonique ( | |||
| (CCITT) | CCITT) | |||
| This organization is part of the International Telecommunications | This organization is now part of the International | |||
| Union (ITU) and is responsible for making technical | Telecommunications Union and is responsible for making technical | |||
| recommendations about telephone and data communications systems. | recommendations about telephone and data communications systems. | |||
| Every four years CCITT holds plenary sessions where they adopt new | Every four years CCITT holds plenary sessions where they adopt new | |||
| standards; the most recent was in 1992. Recently, the ITU | standards; the most recent was in 1992. Recently, the ITU | |||
| reorganized and CCITT was renamed the ITU-TSS. See also: | reorganized and CCITT was renamed the ITU-TSS. See also: | |||
| International Telecommunications Union - Telecommunications | International Telecommunications Union - Telecommunications | |||
| Standards Sector. | Standards Sector. | |||
| [Source: NNSC] | ||||
| Computer Emergency Response Team (CERT) | Computer Emergency Response Team (CERT) | |||
| The CERT was formed by ARPA in November 1988 in response to the | The CERT was formed by ARPA in November 1988 in response to the | |||
| needs exhibited during the Internet worm incident. The CERT | needs exhibited during the Internet worm incident. The CERT | |||
| charter is to work with the Internet community to facilitate its | charter is to work with the Internet community to facilitate its | |||
| response to computer security events involving Internet hosts, to | response to computer security events involving Internet hosts, to | |||
| take proactive steps to raise the community's awareness of | take proactive steps to raise the community's awareness of | |||
| computer security issues, and to conduct research targeted at | computer security issues, and to conduct research targeted at | |||
| improving the security of existing systems. CERT products and | improving the security of existing systems. CERT products and | |||
| services include 24-hour technical assistance for responding to | services include 24-hour technical assistance for responding to | |||
| skipping to change at page 15, line 11 ¶ | skipping to change at page 15, line 15 ¶ | |||
| Cyberspace | Cyberspace | |||
| A term coined by William Gibson in his fantasy novel Neuromancer | A term coined by William Gibson in his fantasy novel Neuromancer | |||
| to describe the "world" of computers, and the society that gathers | to describe the "world" of computers, and the society that gathers | |||
| around them. | around them. | |||
| [Source: ZEN] | [Source: ZEN] | |||
| Cyclic Redundancy Check (CRC) | Cyclic Redundancy Check (CRC) | |||
| A number derived from a set of data that will be transmitted. By | A number derived from a set of data that will be transmitted. By | |||
| recalculating the CRC at the remote end and comparing it to the | recalculating the CRC at the remote end and comparing it to the | |||
| value originally transmitted, the receiving node can detect some | value originally transmitted, the receiving node can detect some | |||
| types of transmission errors. | types of transmission errors. See also: checksum. | |||
| [Source: MALAMUD] | [Source: MALAMUD] | |||
| DANTE | DANTE | |||
| A non-profit company founded in July 1993 to help the European | A non-profit company founded in July 1993 to help the European | |||
| research community enhance their networking facilities. If | research community enhance their networking facilities. It | |||
| focuses on the establishment of a high-speed computer network | focuses on the establishment of a high-speed computer network | |||
| infrastructure. | infrastructure. | |||
| DARPA | DARPA | |||
| Defense Advanced Research Projects Agency | Defense Advanced Research Projects Agency | |||
| See: Advanced Research Projects Agency | See: Advanced Research Projects Agency | |||
| Data Encryption Key (DEK) | Data Encryption Key (DEK) | |||
| Used for the encryption of message text and for the computation of | Used for the encryption of message text and for the computation of | |||
| message integrity checks (signatures). See also: encryption. | message integrity checks (signatures). See also: encryption. | |||
| skipping to change at page 16, line 51 ¶ | skipping to change at page 17, line 7 ¶ | |||
| See also: Defense Data Network. | See also: Defense Data Network. | |||
| DEK | DEK | |||
| See: Data Encryption Key | See: Data Encryption Key | |||
| DES | DES | |||
| See: Data Encryption Standard | See: Data Encryption Standard | |||
| dialup | dialup | |||
| A temporary, as opposed to dedicated, connection between machines | A temporary, as opposed to dedicated, connection between machines | |||
| established over a standard phone line. | established over a phone line (analog or ISDN). See also: | |||
| Integrated Services Digital Network. | ||||
| Directory Access Protocol | Directory Access Protocol | |||
| X.500 protocol used for communication between a Directory User | X.500 protocol used for communication between a Directory User | |||
| Agent and a Directory System Agent. | Agent and a Directory System Agent. | |||
| [Source: MALAMUD] | [Source: MALAMUD] | |||
| Directory System Agent (DSA) | Directory System Agent (DSA) | |||
| The software that provides the X.500 Directory Service for a | The software that provides the X.500 Directory Service for a | |||
| portion of the directory information base. Generally, each DSA is | portion of the directory information base. Generally, each DSA is | |||
| responsible for the directory information for a single | responsible for the directory information for a single | |||
| skipping to change at page 18, line 10 ¶ | skipping to change at page 18, line 15 ¶ | |||
| context. See also: Administrative Domain, Domain Name System. | context. See also: Administrative Domain, Domain Name System. | |||
| Domain Name System (DNS) | Domain Name System (DNS) | |||
| The DNS is a general purpose distributed, replicated, data query | The DNS is a general purpose distributed, replicated, data query | |||
| service. The principal use is the lookup of host IP addresses | service. The principal use is the lookup of host IP addresses | |||
| based on host names. The style of host names now used in the | based on host names. The style of host names now used in the | |||
| Internet is called "domain name", because they are the style of | Internet is called "domain name", because they are the style of | |||
| names used to look up anything in the DNS. Some important domains | names used to look up anything in the DNS. Some important domains | |||
| are: .COM (commercial), .EDU (educational), .NET (network | are: .COM (commercial), .EDU (educational), .NET (network | |||
| operations), .GOV (U.S. government), and .MIL (U.S. military). | operations), .GOV (U.S. government), and .MIL (U.S. military). | |||
| Most countries also have a domain. For example, .US (United | Most countries also have a domain. The country domain names are | |||
| States), .UK (United Kingdom), .AU (Australia). See also: Fully | based on ISO 3166. For example, .US (United States), .UK (United | |||
| Qualified Domain Name. | Kingdom), .AU (Australia). See also: Fully Qualified Domain Name, | |||
| Mail Exchange Record. | ||||
| dot address (dotted decimal notation) | dot address (dotted decimal notation) | |||
| Dot address refers to the common notation for IP addresses of the | Dot address refers to the common notation for IP addresses of the | |||
| form A.B.C.D; where each letter represents, in decimal, one byte | form A.B.C.D; where each letter represents, in decimal, one byte | |||
| of a four byte IP address. See also: IP address. | of a four byte IP address. See also: IP address. | |||
| [Source: FYI4] | [Source: FYI4] | |||
| DS1 | ||||
| A framing specification for T-1 synchronous lines. See also: T1, | ||||
| E1. | ||||
| DS3 | ||||
| A framing specification for T-3 synchronous lines. See also: T3, | ||||
| E3. | ||||
| DSA | DSA | |||
| See: Directory System Agent | See: Directory System Agent | |||
| DTE | DTE | |||
| Data Terminal Equipment | Data Terminal Equipment | |||
| DUA | DUA | |||
| See: Directory User Agent | See: Directory User Agent | |||
| dynamic adaptive routing | dynamic adaptive routing | |||
| Automatic rerouting of traffic based on a sensing and analysis of | Automatic rerouting of traffic based on a sensing and analysis of | |||
| current actual network conditions. NOTE: this does not include | current actual network conditions. NOTE: this does not include | |||
| cases of routing decisions taken on predefined information. | cases of routing decisions taken on predefined information. | |||
| [Source: J. Postel] | [Source: J. Postel] | |||
| E1 | E1 | |||
| The European version of T1 operating at 2.048Mbps. | The basic building block for European multi-megabit data rates, | |||
| with a bandwidth of 2.048Mbps. See also: T1. | ||||
| E3 | E3 | |||
| The European version of T3 operating at 59.352Mbps. | A European standard for transmitting data at 57.344Mbps. See | |||
| also: T3. | ||||
| EARN | EARN | |||
| See: European Academic and Research Network | European Academic and Research Network. See: Trans-European | |||
| Research and Education Networking Association. | ||||
| EBCDIC | EBCDIC | |||
| See: Extended Binary Coded Decimal Interchange Code | See: Extended Binary Coded Decimal Interchange Code | |||
| Ebone | Ebone | |||
| A pan-European backbone service. | A pan-European backbone service. | |||
| EFF | EFF | |||
| See: Electronic Frontier Foundation | See: Electronic Frontier Foundation | |||
| FLEA | ||||
| See: Four Letter Extended Acronym | ||||
| EGP | EGP | |||
| See: Exterior Gateway Protocol | See: Exterior Gateway Protocol | |||
| Electronic Frontier Foundation (EFF) | Electronic Frontier Foundation (EFF) | |||
| A foundation established to address social and legal issues | A foundation established to address social and legal issues | |||
| arising from the impact on society of the increasingly pervasive | arising from the impact on society of the increasingly pervasive | |||
| use of computers as a means of communication and information | use of computers as a means of communication and information | |||
| distribution. | distribution. | |||
| Electronic Mail (email) | Electronic Mail (email) | |||
| skipping to change at page 19, line 45 ¶ | skipping to change at page 19, line 42 ¶ | |||
| email address | email address | |||
| The domain-based or UUCP address that is used to send electronic | The domain-based or UUCP address that is used to send electronic | |||
| mail to a specified destination. For example an editor's address | mail to a specified destination. For example an editor's address | |||
| is "gmalkin@xylogics.com". See also: bang path, mail path, UNIX- | is "gmalkin@xylogics.com". See also: bang path, mail path, UNIX- | |||
| to-UNIX CoPy. | to-UNIX CoPy. | |||
| [Source: ZEN] | [Source: ZEN] | |||
| encapsulation | encapsulation | |||
| The technique used by layered protocols in which a layer adds | The technique used by layered protocols in which a layer adds | |||
| header information to the protocol data unit (PDU) from the layer | header information to the protocol data unit (PDU) from the layer | |||
| above. As an example, in Internet terminology, a packet would | above. For example, in Internet terminology, a packet would | |||
| contain a header from the physical layer, followed by a header | contain a header from the physical layer, followed by a header | |||
| from the datalink layer (e.g. Ethernet), followed by a header | ||||
| from the network layer (IP), followed by a header from the | from the network layer (IP), followed by a header from the | |||
| transport layer (TCP), followed by the application protocol data. | transport layer (e.g. TCP), followed by the application protocol | |||
| data. | ||||
| [Source: RFC1208] | [Source: RFC1208] | |||
| encryption | encryption | |||
| Encryption is the manipulation of a packet's data in order to | Encryption is the manipulation of a packet's data in order to | |||
| prevent any but the intended recipient from reading that data. | prevent any but the intended recipient from reading that data. | |||
| There are many types of data encryption, and they are the basis of | There are many types of data encryption, and they are the basis of | |||
| network security. See also: Data Encryption Standard. | network security. See also: Data Encryption Standard. | |||
| error checking | ||||
| The examination of received data for transmission errors. See | ||||
| also: checksum, Cyclic Redundancy Check. | ||||
| Ethernet | Ethernet | |||
| A 10-Mb/s standard for LANs, initially developed by Xerox, and | A 10-Mb/s standard for LANs, initially developed by Xerox, and | |||
| later refined by Digital, Intel and Xerox (DIX). All hosts are | later refined by Digital, Intel and Xerox (DIX). All hosts are | |||
| connected to a coaxial cable where they contend for network access | connected to a coaxial cable where they contend for network access | |||
| using a Carrier Sense Multiple Access with Collision Detection | using a Carrier Sense Multiple Access with Collision Detection | |||
| (CSMA/CD) paradigm. See also: 802.x, Local Area Network, token | (CSMA/CD) paradigm. See also: 802.x, Local Area Network, token | |||
| ring. | ring. | |||
| Ethernet meltdown | Ethernet meltdown | |||
| An event that causes saturation, or near saturation, on an | An event that causes saturation, or near saturation, on an | |||
| Ethernet. It usually results from illegal or misrouted packets | Ethernet. It usually results from illegal or misrouted packets | |||
| and typically lasts only a short time. See also: broadcast storm. | and typically lasts only a short time. See also: broadcast storm. | |||
| [Source: COMER] | [Source: COMER] | |||
| European Academic and Research Network (EARN) | ||||
| A network connecting European academic and research institutions | ||||
| with electronic mail and file transfer services using the Bitnet | ||||
| protocol. See also: Bitnet | ||||
| Extended Binary Coded Decimal Interchange Code (EBCDIC) | Extended Binary Coded Decimal Interchange Code (EBCDIC) | |||
| A standard character-to-number encoding used primarily by IBM | A standard character-to-number encoding used primarily by IBM | |||
| computer systems. See also: ASCII. | computer systems. See also: ASCII. | |||
| Four Letter Extended Acronym (FLEA) | ||||
| A recognition of the fact that there are far too many TLAs. See | ||||
| also: Three Letter Acronym. | ||||
| Exterior Gateway Protocol (EGP) | Exterior Gateway Protocol (EGP) | |||
| A protocol which distributes routing information to the routers | A protocol which distributes routing information to the routers | |||
| which connect autonomous systems. The term "gateway" is | which connect autonomous systems. The term "gateway" is | |||
| historical, as "router" is currently the preferred term. There is | historical, as "router" is currently the preferred term. There is | |||
| also a routing protocol called EGP defined in RFC 904. See also: | also a routing protocol called EGP defined in RFC 904. See also: | |||
| Autonomous System, Border Gateway Protocol, Interior Gateway | Autonomous System, Border Gateway Protocol, Interior Gateway | |||
| Protocol. | Protocol. | |||
| eXternal Data Representation (XDR) | eXternal Data Representation (XDR) | |||
| A standard for machine independent data structures developed by | A standard for machine independent data structures developed by | |||
| skipping to change at page 21, line 43 ¶ | skipping to change at page 21, line 39 ¶ | |||
| network. See also: File Transfer Protocol, Kermit, Gopher, World | network. See also: File Transfer Protocol, Kermit, Gopher, World | |||
| Wide Web. | Wide Web. | |||
| File Transfer Protocol (FTP) | File Transfer Protocol (FTP) | |||
| A protocol which allows a user on one host to access, and transfer | A protocol which allows a user on one host to access, and transfer | |||
| files to and from, another host over a network. Also, FTP is | files to and from, another host over a network. Also, FTP is | |||
| usually the name of the program the user invokes to execute the | usually the name of the program the user invokes to execute the | |||
| protocol. See also: anonymous FTP. | protocol. See also: anonymous FTP. | |||
| finger | finger | |||
| A program that displays information about a particular user, or | A protocol, defined in RFC 1288, that allows information about a | |||
| all users, logged on the local system or on a remote system. It | system or user on a system to be retrived. Finger also refers to | |||
| typically shows full name, last login time, idle time, terminal | the commonly used program which retrieves this information. | |||
| line, and terminal location (where applicable). It may also | Information about all logged in users, as well is information | |||
| display plan and project files left by the user. | about specific users may be retrieved from local or remote | |||
| systems. Some sites consider finger to be a security risk and | ||||
| have either disabled it, or replaced it with a simple message. | ||||
| FIX | FIX | |||
| See: Federal Information Exchange | See: Federal Information Exchange | |||
| flame | flame | |||
| A strong opinion and/or criticism of something, usually as a frank | A strong opinion and/or criticism of something, usually as a frank | |||
| inflammatory statement, in an electronic mail message. It is | inflammatory statement, in an electronic mail message. It is | |||
| common to precede a flame with an indication of pending fire (i.e. | common to precede a flame with an indication of pending fire (i.e. | |||
| FLAME ON!). Flame Wars occur when people start flaming other | FLAME ON!). Flame Wars occur when people start flaming other | |||
| people for flaming when they shouldn't have. See also: Electronic | people for flaming when they shouldn't have. See also: Electronic | |||
| Mail, Usenet. | Mail, Usenet. | |||
| FLEA | ||||
| See: Four Letter Extended Acronym | ||||
| FNC | FNC | |||
| See: Federal Networking Council | See: Federal Networking Council | |||
| Four Letter Extended Acronym (FLEA) | ||||
| A recognition of the fact that there are far too many TLAs. See | ||||
| also: Three Letter Acronym. | ||||
| FQDN | FQDN | |||
| See: Fully Qualified Domain Name | See: Fully Qualified Domain Name | |||
| fragment | fragment | |||
| A piece of a packet. When a router is forwarding an IP packet to | A piece of a packet. When a router is forwarding an IP packet to | |||
| a network that has a maximum packet size smaller than the packet | a network that has a maximum transmission unit smaller than the | |||
| size, it is forced to break up that packet into multiple | packet size, it is forced to break up that packet into multiple | |||
| fragments. These fragments will be reassembled by the IP layer at | fragments. These fragments will be reassembled by the IP layer at | |||
| the destination host. | the destination host. See also: Maximum Transmission Unit. | |||
| fragmentation | fragmentation | |||
| The IP process in which a packet is broken into smaller pieces to | The IP process in which a packet is broken into smaller pieces to | |||
| fit the requirements of a physical network over which the packet | fit the requirements of a physical network over which the packet | |||
| must pass. See also: reassembly. | must pass. See also: reassembly. | |||
| frame | frame | |||
| A frame is a datalink layer "packet" which contains the header and | A frame is a datalink layer "packet" which contains the header and | |||
| trailer information required by the physical medium. That is, | trailer information required by the physical medium. That is, | |||
| network layer packets are encapsulated to become frames. See | network layer packets are encapsulated to become frames. See | |||
| skipping to change at page 23, line 16 ¶ | skipping to change at page 23, line 20 ¶ | |||
| FYI | FYI | |||
| For Your Information | For Your Information | |||
| FYI | FYI | |||
| A subseries of RFCs that are not technical standards or | A subseries of RFCs that are not technical standards or | |||
| descriptions of protocols. FYIs convey general information about | descriptions of protocols. FYIs convey general information about | |||
| topics related to TCP/IP or the Internet. See also: Request For | topics related to TCP/IP or the Internet. See also: Request For | |||
| Comments. | Comments. | |||
| gross | ||||
| A dozen dozen (144). | ||||
| gated | gated | |||
| Gatedaemon. A program which supports multiple routing protocols | Gatedaemon. A program which supports multiple routing protocols | |||
| and protocol families. It may be used for routing, and makes an | and protocol families. It may be used for routing, and makes an | |||
| effective platform for routing protocol research. The software is | effective platform for routing protocol research. The software is | |||
| freely available by anonymous FTP from "gated.cornell.edu". | freely available by anonymous FTP from "gated.cornell.edu". | |||
| Pronounced "gate-dee". See also: Exterior Gateway Protocol, Open | Pronounced "gate-dee". See also: Exterior Gateway Protocol, Open | |||
| Shortest-Path First, Routing Information Protocol, routed. | Shortest-Path First, Routing Information Protocol, routed. | |||
| gateway | gateway | |||
| The term "router" is now used in place of the original definition | The term "router" is now used in place of the original definition | |||
| of "gateway". Currently, a gateway is a communications | of "gateway". Currently, a gateway is a communications | |||
| device/program which passes data between networks having similar | device/program which passes data between networks having similar | |||
| functions but dissimilar implementations. This should not be | functions but dissimilar implementations. This should not be | |||
| confused with a protocol converter. By this definition, a router | confused with a protocol converter. By this definition, a router | |||
| is a layer 3 (network layer) gateway, and a mail gateway is a | is a layer 3 (network layer) gateway, and a mail gateway is a | |||
| layer 7 (application layer) gateway. See also: mail gateway, | layer 7 (application layer) gateway. See also: mail gateway, | |||
| router, protocol converter. | router, protocol converter. | |||
| Gopher | Gopher | |||
| A distributed information service that makes available | A distributed information service, developed at the University of | |||
| hierarchical collections of information across the Internet. | Minnesota, that makes hierarchical collections of information | |||
| Gopher uses a simple protocol that allows a single Gopher client | available across the Internet. Gopher uses a simple protocol, | |||
| to access information from any accessible Gopher server, providing | defined in RFC 1436, that allows a single Gopher client to access | |||
| the user with a single "Gopher space" of information. Public | information from any accessible Gopher server, providing the user | |||
| domain versions of the client and server are available. See also: | with a single "Gopher space" of information. Public domain | |||
| versions of the client and server are available. See also: | ||||
| archie, archive site, Prospero, Wide Area Information Servers. | archie, archive site, Prospero, Wide Area Information Servers. | |||
| GOSIP | GOSIP | |||
| See: Government OSI Profile | See: Government OSI Profile | |||
| Government OSI Profile (GOSIP) | Government OSI Profile (GOSIP) | |||
| A subset of OSI standards specific to U.S. Government | A subset of OSI standards specific to U.S. Government | |||
| procurements, designed to maximize interoperability in areas where | procurements, designed to maximize interoperability in areas where | |||
| plain OSI standards are ambiguous or allow excessive options. | plain OSI standards are ambiguous or allow excessive options. | |||
| hacker | hacker | |||
| A person who delights in having an intimate understanding of the | A person who delights in having an intimate understanding of the | |||
| internal workings of a system, computers and computer networks in | internal workings of a system, computers and computer networks in | |||
| particular. The term is often misused in a pejorative context, | particular. The term is often misused in a pejorative context, | |||
| where "cracker" would be the correct term. See also: cracker. | where "cracker" would be the correct term. See also: cracker. | |||
| header | header | |||
| The portion of a packet, preceding the actual data, containing | The portion of a packet, preceding the actual data, containing | |||
| source and destination addresses, and error checking and other | source and destination information. It may also error checking and | |||
| fields. A header is also the part of an electronic mail message | other fields. A header is also the part of an electronic mail | |||
| that precedes the body of a message and contains, among other | message which precedes the body of a message and contains, among | |||
| things, the message originator, date and time. See also: | other things, the message originator, date and time. See also: | |||
| Electronic Mail, packet. | Electronic Mail, packet, error checking. | |||
| heterogeneous network | heterogeneous network | |||
| A network running multiple network layer protocols. See also: | A network running multiple network layer protocols. See also: | |||
| DECnet, IP, IPX, XNS, homogeneous network. | DECnet, IP, IPX, XNS, homogeneous network. | |||
| hierarchical routing | hierarchical routing | |||
| The complex problem of routing on large networks can be simplified | The complex problem of routing on large networks can be simplified | |||
| by reducing the size of the networks. This is accomplished by | by reducing the size of the networks. This is accomplished by | |||
| breaking a network into a hierarchy of networks, where each level | breaking a network into a hierarchy of networks, where each level | |||
| is responsible for its own routing. The Internet has, basically, | is responsible for its own routing. The Internet has, basically, | |||
| skipping to change at page 28, line 14 ¶ | skipping to change at page 28, line 14 ¶ | |||
| International Organization for Standardization (ISO) | International Organization for Standardization (ISO) | |||
| A voluntary, nontreaty organization founded in 1946 which is | A voluntary, nontreaty organization founded in 1946 which is | |||
| responsible for creating international standards in many areas, | responsible for creating international standards in many areas, | |||
| including computers and communications. Its members are the | including computers and communications. Its members are the | |||
| national standards organizations of the 89 member countries, | national standards organizations of the 89 member countries, | |||
| including ANSI for the U.S. See also: American National Standards | including ANSI for the U.S. See also: American National Standards | |||
| Institute, Open Systems Interconnection. | Institute, Open Systems Interconnection. | |||
| [Source: TAN] | [Source: TAN] | |||
| International Telecommunications Union | International Telecommunications Union (ITU) | |||
| An agency of the United Nations which coordinates the various | An agency of the United Nations which coordinates the various | |||
| national telecommunications standards so that people in one | national telecommunications standards so that people in one | |||
| country can communicate with people in another country. | country can communicate with people in another country. | |||
| International Telecommunications Union - | International Telecommunications Union - | |||
| Telecommunications Standards Sector (ITU-TSS) | Telecommunications Standards Sector (ITU-TSS) | |||
| The new name for CCITT since the ITU reorganization. The function | The new name for CCITT since the ITU reorganization. The function | |||
| is the same; only the name has been changed | is the same; only the name has been changed | |||
| internet | internet | |||
| skipping to change at page 33, line 14 ¶ | skipping to change at page 33, line 14 ¶ | |||
| Pronounced eye-so-dee-eee. See also: Open Systems | Pronounced eye-so-dee-eee. See also: Open Systems | |||
| Interconnection, TCP/IP Protocol Suite. | Interconnection, TCP/IP Protocol Suite. | |||
| ISOC | ISOC | |||
| See: Internet Society | See: Internet Society | |||
| ISODE | ISODE | |||
| See: ISO Development Environment | See: ISO Development Environment | |||
| ITU | ||||
| See: International Telecommunications Union - | ||||
| Telecommunications Standards Sector | ||||
| ITU-TSS | ||||
| See: International Telecommunications Union | ||||
| JKREY | JKREY | |||
| Joyce K. Reynolds | Joyce K. Reynolds | |||
| KA9Q | KA9Q | |||
| A popular implementation of TCP/IP and associated protocols for | A popular implementation of TCP/IP and associated protocols for | |||
| amateur packet radio systems. See also: TCP/IP Protocol Suite. | amateur packet radio systems. See also: TCP/IP Protocol Suite. | |||
| [Source: RFC1208] | [Source: RFC1208] | |||
| Kerberos | Kerberos | |||
| Kerberos is the security system of MIT's Project Athena. It is | Kerberos is the security system of MIT's Project Athena. It is | |||
| skipping to change at page 33, line 38 ¶ | skipping to change at page 33, line 45 ¶ | |||
| Because Kermit runs in most operating environments, it provides an | Because Kermit runs in most operating environments, it provides an | |||
| easy method of file transfer. Kermit is NOT the same as FTP. See | easy method of file transfer. Kermit is NOT the same as FTP. See | |||
| also: File Transfer Protocol | also: File Transfer Protocol | |||
| [Source: MALAMUD] | [Source: MALAMUD] | |||
| Knowbot | Knowbot | |||
| A "Knowledge Robot" is a program which seeks out information based | A "Knowledge Robot" is a program which seeks out information based | |||
| on specified criteria. "Knowbot," as trademarked by CNRI, refers | on specified criteria. "Knowbot," as trademarked by CNRI, refers | |||
| specifically to the search engine for Knowbot Information | specifically to the search engine for Knowbot Information | |||
| Services. See also: Corporation for National Research | Services. See also: Corporation for National Research | |||
| Initiatives. | Initiatives, X.500, white pages, whois, netfind. | |||
| Knowbot Information Services | Knowbot Information Services | |||
| An experimental directory service. See also: white pages, whois, | An experimental directory service. See also: white pages, whois, | |||
| X.500. | X.500. | |||
| LAN | LAN | |||
| See: Local Area Network | See: Local Area Network | |||
| layer | layer | |||
| Communication networks for computers may be organized as a set of | Communication networks for computers may be organized as a set of | |||
| skipping to change at page 34, line 15 ¶ | skipping to change at page 34, line 22 ¶ | |||
| protocols appropriate to the layer to communicate with each other. | protocols appropriate to the layer to communicate with each other. | |||
| TCP/IP has five layers of protocols; OSI has seven. The | TCP/IP has five layers of protocols; OSI has seven. The | |||
| advantages of different layers of protocols is that the methods of | advantages of different layers of protocols is that the methods of | |||
| passing information from one layer to another are specified | passing information from one layer to another are specified | |||
| clearly as part of the protocol suite, and changes within a | clearly as part of the protocol suite, and changes within a | |||
| protocol layer are prevented from affecting the other layers. | protocol layer are prevented from affecting the other layers. | |||
| This greatly simplifies the task of designing and maintaining | This greatly simplifies the task of designing and maintaining | |||
| communication programs. See also: Open Systems Interconnection, | communication programs. See also: Open Systems Interconnection, | |||
| TCP/IP Protocol Suite. | TCP/IP Protocol Suite. | |||
| LDAP | ||||
| See: Lightweight Directory Access Protocol | ||||
| Lightweight Directory Access Protocol | ||||
| This protocol provides access for management and browser | ||||
| applications that provide read/write interactive access to the | ||||
| X.500 Directory. See also: X.500. | ||||
| link | ||||
| A pointer which may be used to retreive the file or data to which | ||||
| the pointer points. | ||||
| list server | list server | |||
| An automated mailing list distribution system. List servers | An automated mailing list distribution system. List servers | |||
| handle the administrivia of mailing list maintenance, such as the | handle the administrivia of mailing list maintenance, such as the | |||
| adding and deleting of list members. | adding and deleting of list members. | |||
| little-endian | little-endian | |||
| A format for storage or transmission of binary data in which the | A format for storage or transmission of binary data in which the | |||
| least significant byte (bit) comes first. See also: big-endian. | least significant byte (bit) comes first. See also: big-endian. | |||
| [Source: RFC1208] | [Source: RFC1208] | |||
| LLC | LLC | |||
| See: Logical Link Control | See: Logical Link Control | |||
| Local Area Network (LAN) | Local Area Network (LAN) | |||
| A data network intended to serve an area of only a few square | A data network intended to serve an area of only a few square | |||
| kilometers or less. Because the network is known to cover only a | kilometers or less. Because the network is known to cover only a | |||
| small area, optimizations can be made in the network signal | small area, optimizations can be made in the network signal | |||
| protocols that permit data rates up to 100Mb/s. See also: | protocols that permit data rates up to 100Mb/s. See also: | |||
| Ethernet, Fiber Distributed Data Interface, token ring, Wide Area | Ethernet, Fiber Distributed Data Interface, token ring, | |||
| Network. | Metropolitan Area Network, Wide Area Network. | |||
| [Source: NNSC] | [Source: NNSC] | |||
| Logical Link Control (LLC) | Logical Link Control (LLC) | |||
| The upper portion of the datalink layer, as defined in IEEE 802.2. | The upper portion of the datalink layer, as defined in IEEE 802.2. | |||
| The LLC sublayer presents a uniform interface to the user of the | The LLC sublayer presents a uniform interface to the user of the | |||
| datalink service, usually the network layer. Beneath the LLC | datalink service, usually the network layer. Beneath the LLC | |||
| sublayer is the MAC sublayer. See also: 802.x, layer, Media | sublayer is the MAC sublayer. See also: 802.x, layer, Media | |||
| Access Control. | Access Control. | |||
| Lurking | Lurking | |||
| No active participation on the part of a subscriber to an mailing | No active participation on the part of a subscriber to an mailing | |||
| list or USENET newsgroup. A person who is lurking is just | list or USENET newsgroup. A person who is lurking is just | |||
| listening to the discussion. Lurking is encouraged for beginners | listening to the discussion. Lurking is encouraged for beginners | |||
| who need to get up to speed on the history of the group. See | who need to get up to speed on the history of the group. See | |||
| also: Electronic Mail, mailing list, Usenet. | also: Electronic Mail, mailing list, Usenet. | |||
| [Source: LAQUEY] | [Source: LAQUEY] | |||
| Lycos | ||||
| Lycos, Inc. is a new venture formed in late June 1995, to develop | ||||
| and market the Lycos technology originally developed under the | ||||
| direction of Dr. Michael ("Fuzzy") Mauldin at Carnegie Mellon | ||||
| University. The part of Lycos you see when you do a search is the | ||||
| search engine. "Lycos" comes from Lycosidae, a cosmopolitan | ||||
| family of relatively large active ground spiders (Wolf Spiders) | ||||
| that catch their prey by pursuit, rather than in a web. | ||||
| [Source: Lycos's FAQ] | ||||
| MAC | MAC | |||
| See: Media Access Control | See: Media Access Control | |||
| MAC address | MAC address | |||
| The hardware address of a device connected to a shared media. See | The hardware address of a device connected to a shared media. See | |||
| also: Media Access Control, Ethernet, token ring. | also: Media Access Control, Ethernet, token ring. | |||
| [Source: MALAMUD] | [Source: MALAMUD] | |||
| mail bridge | mail bridge | |||
| A mail gateway that forwards electronic mail between two or more | A mail gateway that forwards electronic mail between two or more | |||
| skipping to change at page 36, line 22 ¶ | skipping to change at page 36, line 50 ¶ | |||
| mailing list | mailing list | |||
| A list of email addresses, used by a mail exploder, to forward | A list of email addresses, used by a mail exploder, to forward | |||
| messages to groups of people. Generally, a mailing list is used | messages to groups of people. Generally, a mailing list is used | |||
| to discuss certain set of topics, and different mailing lists | to discuss certain set of topics, and different mailing lists | |||
| discuss different topics. A mailing list may be moderated. This | discuss different topics. A mailing list may be moderated. This | |||
| means that messages sent to the list are actually sent to a | means that messages sent to the list are actually sent to a | |||
| moderator who determines whether or not to send the messages on to | moderator who determines whether or not to send the messages on to | |||
| everyone else. Requests to subscribe to, or leave, a mailing list | everyone else. Requests to subscribe to, or leave, a mailing list | |||
| should ALWAYS be sent to the list's "-request" address (e.g. | should ALWAYS be sent to the list's "-request" address (e.g. | |||
| ietf-request@cnri.reston.va.us for the IETF mailing list). See | ietf-request@cnri.reston.va.us for the IETF mailing list) or | |||
| also: Electronic Mail, mail exploder. | majordomo server. See also: Electronic Mail, mail exploder, email | |||
| address, moderator, majordomo. | ||||
| majordomo | ||||
| A program which handles mailing list maintenance (affectionately | ||||
| known as administrivia) such as adding and removing addresses from | ||||
| mailing lists. See also: email address, mailing list. | ||||
| MAN | MAN | |||
| See: Metropolitan Area Network | See: Metropolitan Area Network | |||
| Management Information Base (MIB) | Management Information Base (MIB) | |||
| The set of parameters an SNMP management station can query or set | The set of parameters an SNMP management station can query or set | |||
| in the SNMP agent of a network device (e.g. router). Standard, | in the SNMP agent of a network device (e.g. router). Standard, | |||
| minimal MIBs have been defined, and vendors often have Private | minimal MIBs have been defined, and vendors often have Private | |||
| enterprise MIBs. In theory, any SNMP manager can talk to any SNMP | enterprise MIBs. In theory, any SNMP manager can talk to any SNMP | |||
| agent with a properly defined MIB. See also: client-server model, | agent with a properly defined MIB. See also: client-server model, | |||
| skipping to change at page 36, line 46 ¶ | skipping to change at page 37, line 32 ¶ | |||
| Martian | Martian | |||
| A humorous term applied to packets that turn up unexpectedly on | A humorous term applied to packets that turn up unexpectedly on | |||
| the wrong network because of bogus routing entries. Also used as | the wrong network because of bogus routing entries. Also used as | |||
| a name for a packet which has an altogether bogus (non-registered | a name for a packet which has an altogether bogus (non-registered | |||
| or ill-formed) internet address. | or ill-formed) internet address. | |||
| [Source: RFC1208] | [Source: RFC1208] | |||
| Maximum Transmission Unit (MTU) | Maximum Transmission Unit (MTU) | |||
| The largest frame length which may be sent on a physical medium. | The largest frame length which may be sent on a physical medium. | |||
| See also: fragmentation, frame. | See also: frame, fragment, fragmentation. | |||
| mbone | mbone | |||
| The Multicast Backbone is based on IP multicasting using class-D | The Multicast Backbone is based on IP multicasting using class-D | |||
| addresses. The mbone concept was adopted at the March 1992 IETF | addresses. The mbone concept was adopted at the March 1992 IETF | |||
| in San Diego, during which it was used to audiocast to 40 people | in San Diego, during which it was used to audiocast to 40 people | |||
| throughout the world. At the following meeting, in Cambridge, the | throughout the world. At the following meeting, in Cambridge, the | |||
| name mbone was adopted. Since then the audiocast has become full | name mbone was adopted. Since then the audiocast has become full | |||
| two-way audio/video conferencing using two video channels, four | two-way audio/video conferencing using two video channels, four | |||
| audio channels, and involving hundreds of remote users. See also: | audio channels, and involving hundreds of remote users. See also: | |||
| multicast, Internet Engineering Task Force. | multicast, Internet Engineering Task Force. | |||
| skipping to change at page 38, line 15 ¶ | skipping to change at page 38, line 50 ¶ | |||
| MNP | MNP | |||
| See: Microcom Networking Protocol | See: Microcom Networking Protocol | |||
| moderator | moderator | |||
| A person, or small group of people, who manage moderated mailing | A person, or small group of people, who manage moderated mailing | |||
| lists and newsgroups. Moderators are responsible for determining | lists and newsgroups. Moderators are responsible for determining | |||
| which email submissions are passed on to list. See also: | which email submissions are passed on to list. See also: | |||
| Electronic Mail, mailing list, Usenet. | Electronic Mail, mailing list, Usenet. | |||
| MOSPF | MOSPF | |||
| See: Open Shortest-Path First | Multicast Open Shortest-Path First. See: Open Shortest-Path First. | |||
| MTU | MTU | |||
| See: Maximum Transmission Unit | See: Maximum Transmission Unit | |||
| MUD | MUD | |||
| See: Multi-User Dungeon | See: Multi-User Dungeon | |||
| multicast | multicast | |||
| A packet with a special destination address which multiple nodes | A packet with a special destination address which multiple nodes | |||
| on the network may be willing to receive. See also: broadcast, | on the network may be willing to receive. See also: broadcast, | |||
| skipping to change at page 39, line 39 ¶ | skipping to change at page 40, line 27 ¶ | |||
| research. The NSFNET, funded by NSF, was once an essential part | research. The NSFNET, funded by NSF, was once an essential part | |||
| of academic and research communications. It was a highspeed, | of academic and research communications. It was a highspeed, | |||
| hierarchical "network of networks." At the highest level, it had | hierarchical "network of networks." At the highest level, it had | |||
| a backbone network of nodes, interconnected with T3 (45Mbps) | a backbone network of nodes, interconnected with T3 (45Mbps) | |||
| facilities which spaned the continental United States. Attached | facilities which spaned the continental United States. Attached | |||
| to that were mid-level networks, and attached to the mid-levels | to that were mid-level networks, and attached to the mid-levels | |||
| were campus and local networks. See also: backbone network, mid- | were campus and local networks. See also: backbone network, mid- | |||
| level network. | level network. | |||
| Negative Acknowledgment (NAK) | Negative Acknowledgment (NAK) | |||
| Response to receipt of a corrupted packet of information. See | Response to the receipt of either a corrupted or unnexpected | |||
| also: Acknowledgement. | packet of information. See also: Acknowledgement. | |||
| netfind | ||||
| A research prototype to provide a simple Internet "white pages" | ||||
| user directory. Developed at the University of Colorado, Boulder, | ||||
| it tries to locate telephone and email information given a | ||||
| person's name and a rough description of where the person works. | ||||
| See also: Knowbot, whois, white pages, X.500. | ||||
| [Source: Ryan Moats] | ||||
| netiquette | netiquette | |||
| A pun on "etiquette" referring to proper behavior on a network. | A pun on "etiquette" referring to proper behavior on a network. | |||
| RFC 1855 (FYI 28) contains a netiquette guide produced by the User | ||||
| Services area of the IETF. See also: Acceptable Use Policy, | ||||
| Internet Engineering Task Force. | ||||
| Netnews | Netnews | |||
| See: Usenet | See: Usenet | |||
| network | network | |||
| A computer network is a data communications system which | A computer network is a data communications system which | |||
| interconnects computer systems at various different sites. A | interconnects computer systems at various different sites. A | |||
| network may be composed of any combination of LANs, MANs or WANs. | network may be composed of any combination of LANs, MANs or WANs. | |||
| See also: Local Area Network, Metropolitan Area Network, Wide Area | See also: Local Area Network, Metropolitan Area Network, Wide Area | |||
| Network, internet. | Network, internet. | |||
| skipping to change at page 41, line 16 ¶ | skipping to change at page 42, line 16 ¶ | |||
| [Source: NNSC] | [Source: NNSC] | |||
| NFS | NFS | |||
| See: Network File System | See: Network File System | |||
| NIC | NIC | |||
| See: Network Information Center | See: Network Information Center | |||
| NIC.DDN.MIL | NIC.DDN.MIL | |||
| This is the domain name of the DDN NIC. See also: Defense Data | This is the domain name of the DDN NIC. See also: Defense Data | |||
| Network..., Domain Name System, Network Information Center. | Network, Domain Name System, Network Information Center. | |||
| NIS | NIS | |||
| See: Network Information Services | See: Network Information Services | |||
| NIST | NIST | |||
| See: National Institute of Standards and Technology | See: National Institute of Standards and Technology | |||
| NNTP | NNTP | |||
| See: Network News Transfer Protocol | See: Network News Transfer Protocol | |||
| skipping to change at page 44, line 28 ¶ | skipping to change at page 45, line 28 ¶ | |||
| postmaster | postmaster | |||
| The person responsible for taking care of electronic mail | The person responsible for taking care of electronic mail | |||
| problems, answering queries about users, and other related work at | problems, answering queries about users, and other related work at | |||
| a site. See also: Electronic Mail. | a site. See also: Electronic Mail. | |||
| [Source: ZEN] | [Source: ZEN] | |||
| PPP | PPP | |||
| See: Point-to-Point Protocol | See: Point-to-Point Protocol | |||
| Pretty Good Privacy | Pretty Good Privacy (PGP) | |||
| A program which cryptographically protects files and electronic | A program, developed by Phil Zimmerman, which cryptographically | |||
| mail from being read by others. It may also be used to digitally | protects files and electronic mail from being read by others. It | |||
| sign a document or message, thus authenticating the creator. See | may also be used to digitally sign a document or message, thus | |||
| also: encryption, Data Encryption Standard, RSA. | authenticating the creator. See also: encryption, Data Encryption | |||
| Standard, RSA. | ||||
| Privacy Enhanced Mail (PEM) | Privacy Enhanced Mail (PEM) | |||
| Internet email which provides confidentiality, authentication and | Internet email which provides confidentiality, authentication and | |||
| message integrity using various encryption methods. See also: | message integrity using various encryption methods. See also: | |||
| Electronic Mail, encryption. | Electronic Mail, encryption. | |||
| Prospero | Prospero | |||
| A distributed filesystem which provides the user with the ability | A distributed filesystem which provides the user with the ability | |||
| to create multiple views of a single collection of files | to create multiple views of a single collection of files | |||
| distributed across the Internet. Prospero provides a file naming | distributed across the Internet. Prospero provides a file naming | |||
| skipping to change at page 45, line 40 ¶ | skipping to change at page 46, line 41 ¶ | |||
| PSN | PSN | |||
| See: Packet Switch Node. | See: Packet Switch Node. | |||
| PTT | PTT | |||
| See: Postal, Telegraph and Telephone | See: Postal, Telegraph and Telephone | |||
| queue | queue | |||
| A backup of packets awaiting processing. | A backup of packets awaiting processing. | |||
| RARE | RARE | |||
| See: Reseaux Associes pour la Recherche Europeenne | Reseaux Associes pour la Recherche Europeenne. See: Trans- | |||
| European Research and Education Networking Association. | ||||
| RARP | RARP | |||
| See: Reverse Address Resolution Protocol | See: Reverse Address Resolution Protocol | |||
| RBOC | RBOC | |||
| Regional Bell Operating Company | Regional Bell Operating Company | |||
| RCP | Read The F*cking Manual (RTFM) | |||
| See: Remote copy program | ||||
| Read the F*cking Manual (RTFM) | ||||
| This acronym is often used when someone asks a simple or common | This acronym is often used when someone asks a simple or common | |||
| question. | question. | |||
| Read The Source Code (RTSC) | ||||
| This acronym is often used when a software developer asks a | ||||
| question about undocumented code. | ||||
| reassembly | reassembly | |||
| The IP process in which a previously fragmented packet is | The IP process in which a previously fragmented packet is | |||
| reassembled before being passed to the transport layer. See also: | reassembled before being passed to the transport layer. See also: | |||
| fragmentation. | fragmentation. | |||
| recursive | recursive | |||
| See: recursive | See: recursive | |||
| regional | regional | |||
| See: mid-level network | See: mid-level network | |||
| skipping to change at page 46, line 48 ¶ | skipping to change at page 48, line 5 ¶ | |||
| The document series, begun in 1969, which describes the Internet | The document series, begun in 1969, which describes the Internet | |||
| suite of protocols and related experiments. Not all (in fact very | suite of protocols and related experiments. Not all (in fact very | |||
| few) RFCs describe Internet standards, but all Internet standards | few) RFCs describe Internet standards, but all Internet standards | |||
| are written up as RFCs. The RFC series of documents is unusual in | are written up as RFCs. The RFC series of documents is unusual in | |||
| that the proposed protocols are forwarded by the Internet research | that the proposed protocols are forwarded by the Internet research | |||
| and development community, acting on their own behalf, as opposed | and development community, acting on their own behalf, as opposed | |||
| to the formally reviewed and standardized protocols that are | to the formally reviewed and standardized protocols that are | |||
| promoted by organizations such as CCITT and ANSI. See also: BCP, | promoted by organizations such as CCITT and ANSI. See also: BCP, | |||
| FYI, STD. | FYI, STD. | |||
| Reseaux Associes pour la Recherche Europeenne (RARE) | ||||
| European association of research networks. | ||||
| [Source: RFC1208] | ||||
| Reseaux IP Europeenne (RIPE) | Reseaux IP Europeenne (RIPE) | |||
| A collaboration between European networks which use the TCP/IP | A collaboration between European networks which use the TCP/IP | |||
| protocol suite. | protocol suite. | |||
| Reverse Address Resolution Protocol (RARP) | Reverse Address Resolution Protocol (RARP) | |||
| A protocol, defined in RFC 903, which provides the reverse | A protocol, defined in RFC 903, which provides the reverse | |||
| function of ARP. RARP maps a hardware (MAC) address to an | function of ARP. RARP maps a hardware (MAC) address to an | |||
| internet address. It is used primarily by diskless nodes when | internet address. It is used primarily by diskless nodes when | |||
| they first initialize to find their internet address. See also: | they first initialize to find their internet address. See also: | |||
| Address Resolution Protocol, BOOTP, internet address, MAC address. | Address Resolution Protocol, BOOTP, internet address, MAC address. | |||
| skipping to change at page 48, line 29 ¶ | skipping to change at page 49, line 29 ¶ | |||
| RPC | RPC | |||
| See: Remote Procedure Call | See: Remote Procedure Call | |||
| RSA | RSA | |||
| A public-key cryptographic system which may be used for encryption | A public-key cryptographic system which may be used for encryption | |||
| and authentication. It was invented in 1977 and named for its | and authentication. It was invented in 1977 and named for its | |||
| inventors: Ron Rivest, Adi Shamir, and Leonard Adleman. See also: | inventors: Ron Rivest, Adi Shamir, and Leonard Adleman. See also: | |||
| encryption, Data Encryption Standard, Pretty Good Privacy. | encryption, Data Encryption Standard, Pretty Good Privacy. | |||
| RTFM | RTFM | |||
| See: Read the F*cking Manual | See: Read The F*cking Manual | |||
| RTSC | ||||
| See: Read The Source Code | ||||
| RTT | RTT | |||
| See: Round-Trip Time | See: Round-Trip Time | |||
| SDH | ||||
| See: Synchronous Digital Hierarchy | ||||
| Serial Line IP (SLIP) | Serial Line IP (SLIP) | |||
| A protocol used to run IP over serial lines, such as telephone | A protocol used to run IP over serial lines, such as telephone | |||
| circuits or RS-232 cables, interconnecting two systems. SLIP is | circuits or RS-232 cables, interconnecting two systems. SLIP is | |||
| defined in RFC 1055, but is not an Internet Standard. It is being | defined in RFC 1055, but is not an Internet Standard. It is being | |||
| replaced by PPP. See also: Point-to-Point Protocol. | replaced by PPP. See also: Point-to-Point Protocol. | |||
| server | server | |||
| A provider of resources (e.g. file servers and name servers). See | A provider of resources (e.g. file servers and name servers). See | |||
| also: client, Domain Name System, Network File System. | also: client, Domain Name System, Network File System. | |||
| skipping to change at page 50, line 18 ¶ | skipping to change at page 51, line 26 ¶ | |||
| A type of transport service that allows its client to send data in | A type of transport service that allows its client to send data in | |||
| a continuous stream. The transport service will guarantee that | a continuous stream. The transport service will guarantee that | |||
| all data will be delivered to the other end in the same order as | all data will be delivered to the other end in the same order as | |||
| sent and without duplicates. See also: Transmission Control | sent and without duplicates. See also: Transmission Control | |||
| Protocol. | Protocol. | |||
| [Source: MALAMUD] | [Source: MALAMUD] | |||
| Structure of Management Information (SMI) | Structure of Management Information (SMI) | |||
| The rules used to define the objects that can be accessed via a | The rules used to define the objects that can be accessed via a | |||
| network management protocol. These rules are defined in RFC 1155 | network management protocol. These rules are defined in RFC 1155 | |||
| (STD 17). See also: Management Information Base. | (STD 17). The acronym is pronounced "Ess Em Eye." See also: | |||
| [Source: RFC1208] | Management Information Base. .br [Source: RFC1208] | |||
| stub network | stub network | |||
| A stub network only carries packets to and from local hosts. Even | A stub network only carries packets to and from local hosts. Even | |||
| if it has paths to more than one other network, it does not carry | if it has paths to more than one other network, it does not carry | |||
| traffic for other networks. See also: backbone, transit network. | traffic for other networks. See also: backbone, transit network. | |||
| subnet | subnet | |||
| A portion of a network, which may be a physically independent | A portion of a network, which may be a physically independent | |||
| network segment, which shares a network address with other | network segment, which shares a network address with other | |||
| portions of the network and is distinguished by a subnet number. | portions of the network and is distinguished by a subnet number. | |||
| skipping to change at page 51, line 14 ¶ | skipping to change at page 52, line 21 ¶ | |||
| 255.255.252.0. See also: IP address, network address, network | 255.255.252.0. See also: IP address, network address, network | |||
| mask, Classless Inter-domain Routing. | mask, Classless Inter-domain Routing. | |||
| Switched Multimegabit Data Service (SMDS) | Switched Multimegabit Data Service (SMDS) | |||
| An emerging high-speed datagram-based public data network service | An emerging high-speed datagram-based public data network service | |||
| developed by Bellcore and expected to be widely used by telephone | developed by Bellcore and expected to be widely used by telephone | |||
| companies as the basis for their data networks. See also: | companies as the basis for their data networks. See also: | |||
| Metropolitan Area Network. | Metropolitan Area Network. | |||
| [Source: RFC1208] | [Source: RFC1208] | |||
| Synchronous Digital Hierarchy (SDH) | ||||
| The European standard for high-speed data communications over | ||||
| fiber-optic media. The transmission rates range from 155.52Mbps | ||||
| to 2.5Gbps. | ||||
| Synchronous Optical NETwork (SONET) | Synchronous Optical NETwork (SONET) | |||
| SONET is an international standard for high-speed data | SONET is an international standard for high-speed data | |||
| communications over fiber-optic media. The transmission rates | communications over fiber-optic media. The transmission rates | |||
| range from 51.84Mbps to 2.5Gbps. | range from 51.84Mbps to 2.5Gbps. | |||
| Systems Network Architecture (SNA) | Systems Network Architecture (SNA) | |||
| A proprietary networking architecture used by IBM and IBM- | A proprietary networking architecture used by IBM and IBM- | |||
| compatible mainframe computers. | compatible mainframe computers. | |||
| [Source: NNSC] | [Source: NNSC] | |||
| T1 | T1 | |||
| An AT&T term for a digital carrier facility used to transmit a | A term for a digital carrier facility used to transmit a DS-1 | |||
| DS-1 formatted digital signal at 1.544 megabits per second. | formatted digital signal at 1.544 megabits per second. | |||
| T3 | T3 | |||
| A term for a digital carrier facility used to transmit a DS-3 | A term for a digital carrier facility used to transmit a DS-3 | |||
| formatted digital signal at 44.746 megabits per second. | formatted digital signal at 44.746 megabits per second. | |||
| [Source: FYI4] | [Source: FYI4] | |||
| TAC | TAC | |||
| See: Terminal Access Controller (TAC) | See: Terminal Access Controller (TAC) | |||
| talk | talk | |||
| skipping to change at page 55, line 47 ¶ | skipping to change at page 57, line 11 ¶ | |||
| uuencode | uuencode | |||
| A program which reversibly converts a binary file in ASCII. It is | A program which reversibly converts a binary file in ASCII. It is | |||
| used to send binary files via email, which generally does not | used to send binary files via email, which generally does not | |||
| allow (or garbles) the transmission of binary information. The | allow (or garbles) the transmission of binary information. The | |||
| original binary can be restored with uudecode. The encoding | original binary can be restored with uudecode. The encoding | |||
| process generally creates an ASCII file larger than the original | process generally creates an ASCII file larger than the original | |||
| binary, so compressing the binary before running uuencode is | binary, so compressing the binary before running uuencode is | |||
| highly recommended. | highly recommended. | |||
| Veronica | ||||
| A Gopher utility which effectively searches Gopher servers based | ||||
| on a user's list of keywords. The name was chosen to be a "mate" | ||||
| to another utility named "Archie." It later became an acronym for | ||||
| Very Easy Rodent Oriented Netwide Index to Computer Archives. See | ||||
| also: archie, Gopher. | ||||
| virtual circuit | virtual circuit | |||
| A network service which provides connection-oriented service | A network service which provides connection-oriented service | |||
| regardless of the underlying network structure. See also: | without necessarily doing circuit-switching. See also: | |||
| connection-oriented. | connection-oriented. | |||
| virus | virus | |||
| A program which replicates itself on computer systems by | A program which replicates itself on computer systems by | |||
| incorporating itself into other programs which are shared among | incorporating itself into other programs which are shared among | |||
| computer systems. See also: Trojan Horse, worm. | computer systems. See also: Trojan Horse, worm. | |||
| W3 | W3 | |||
| See: World Wide Web | See: World Wide Web | |||
| WAIS | WAIS | |||
| See: Wide Area Information Servers | See: Wide Area Information Servers | |||
| WAN | WAN | |||
| See: Wide area network | See: Wide area network | |||
| WebCrawler | ||||
| A WWW search engine. The aim of the WebCrawler Project is to | ||||
| provide a high-quality, fast, and free Internet search service. | ||||
| The WebCrawler may be reached at "http://webcrawler.com/". | ||||
| [Source: WebCrawler's "WebCrawler Facts"] | ||||
| WG | WG | |||
| Working Group | See: Working Group | |||
| white pages | white pages | |||
| The Internet supports several databases that contain basic | The Internet supports several databases that contain basic | |||
| information about users, such as e-mail addresses, telephone | information about users, such as e-mail addresses, telephone | |||
| numbers, and postal addresses. These databases can be searched to | numbers, and postal addresses. These databases can be searched to | |||
| get information about particular individuals. Because they serve | get information about particular individuals. Because they serve | |||
| a function akin to the telephone book, these databases are often | a function akin to the telephone book, these databases are often | |||
| referred to as "white pages. See also: Knowbot, whois, X.500. | referred to as "white pages." See also: Knowbot, netfind, whois, | |||
| X.500, InterNIC. | ||||
| whois | whois | |||
| An Internet program which allows users to query a database of | An Internet program which allows users to query a database of | |||
| people and other Internet entities, such as domains, networks, and | people and other Internet entities, such as domains, networks, and | |||
| hosts. The primary database is kept at the InterNIC. The | hosts. The primary database is kept at the InterNIC. The | |||
| information stored includes a person's company name, address, | information stored includes a person's company name, address, | |||
| phone number and email address. The latest version of the | phone number and email address. The latest version of the | |||
| protocol, WHOIS++, is defined in RFCs 1834 and 1835. See also: | protocol, WHOIS++, is defined in RFCs 1834 and 1835. See also: | |||
| InterNIC, white pages, Knowbot, X.500. | InterNIC, white pages, Knowbot, netfind, X.500. | |||
| Wide Area Information Servers (WAIS) | Wide Area Information Servers (WAIS) | |||
| A distributed information service which offers simple natural | A distributed information service which offers simple natural | |||
| language input, indexed searching for fast retrieval, and a | language input, indexed searching for fast retrieval, and a | |||
| "relevance feedback" mechanism which allows the results of initial | "relevance feedback" mechanism which allows the results of initial | |||
| searches to influence future searches. Public domain | searches to influence future searches. Public domain | |||
| implementations are available. See also: archie, Gopher, | implementations are available. See also: archie, Gopher, | |||
| Prospero. | Prospero. | |||
| Wide Area Network (WAN) | Wide Area Network (WAN) | |||
| A network, usually constructed with serial lines, which covers a | A network, usually constructed with serial lines, which covers a | |||
| large geographic area. See also: Local Area Network, Metropolitan | large geographic area. See also: Local Area Network, Metropolitan | |||
| Area Network. | Area Network. | |||
| World Wide Web (WWW or W3) | Working Group (WG) | |||
| A working group, within the IETF, is a group of people who work | ||||
| under a charter to achieve a certain goal. That goal may be the | ||||
| creation of an Informational document, the creation of a protocol | ||||
| specification, or the resolution of problems in the Internet. | ||||
| Most working groups have a finite lifetime. That is, once a | ||||
| working group has achieved its goal, it disbands. There is no | ||||
| official membership for a working group. Unofficially, a working | ||||
| group member is somebody who is on that working group's mailing | ||||
| list; however, anyone may attend a working group meeting. See | ||||
| also: Internet Engineering Task Force, Birds Of a Feather. | ||||
| World Wide Web (WWW, W3) | ||||
| A hypertext-based, distributed information system created by | A hypertext-based, distributed information system created by | |||
| researchers at CERN in Switzerland. Users may create, edit or | researchers at CERN in Switzerland. Users may create, edit or | |||
| browse hypertext documents. The clients and servers are freely | browse hypertext documents. The clients and servers are freely | |||
| available. | available. | |||
| worm | worm | |||
| A computer program which replicates itself and is self- | A computer program which replicates itself and is self- | |||
| propagating. Worms, as opposed to viruses, are meant to spawn in | propagating. Worms, as opposed to viruses, are meant to spawn in | |||
| network environments. Network worms were first defined by Shoch & | network environments. Network worms were first defined by Shoch & | |||
| Hupp of Xerox in ACM Communications (March 1982). The Internet | Hupp of Xerox in ACM Communications (March 1982). The Internet | |||
| skipping to change at page 58, line 6 ¶ | skipping to change at page 59, line 41 ¶ | |||
| in Europe and Canada. | in Europe and Canada. | |||
| X.500 | X.500 | |||
| The CCITT and ISO standard for electronic directory services. See | The CCITT and ISO standard for electronic directory services. See | |||
| also: white pages, Knowbot, whois. | also: white pages, Knowbot, whois. | |||
| XDR | XDR | |||
| See: eXternal Data Representation | See: eXternal Data Representation | |||
| Xerox Network System (XNS) | Xerox Network System (XNS) | |||
| A network developed by Xerox corporation. Implementations exist | A protocol suite developed by Xerox Corporation to run on LAN and | |||
| for both 4.3BSD derived systems, as well as the Xerox Star | WAN networks, where the LANs are typically Ethernet. | |||
| computers; however, the protocol is no longer in wide-spread use. | Implementations exist for both Xerox's workstations and 4.3BSD, | |||
| and 4.3BSD-derived, systems. XNS denotes not only the protocol | ||||
| stack, but also an architecture of standard programming | ||||
| interfaces, conventions, and service functions for authentication, | ||||
| directory, filing, email, and remote procedure call. XNS is also | ||||
| the name of Xerox's implementation. See also: Ethernet, Berkeley | ||||
| Software Distribution, Local Area Network, Wide Area Network. | ||||
| [Source: Jeff Hodges] | ||||
| XNS | XNS | |||
| See: Xerox Network System | See: Xerox Network System | |||
| Yahoo! | ||||
| Yahoo! is a hierarchical subject-oriented guide for the World Wide | ||||
| Web and Internet. Yahoo! lists sites and categorizes them into | ||||
| appropriate subject categories. Yahoo! may be reached at | ||||
| "http://www.yahoo.com/". | ||||
| [Source: Yahoo's "What is Yahoo?"] | ||||
| Yellow Pages (YP) | Yellow Pages (YP) | |||
| A historic (i.e., no longer in use) service used by UNIX | A historic (i.e., no longer in use) service used by UNIX | |||
| administrators to manage databases distributed across a network. | administrators to manage databases distributed across a network. | |||
| YP | YP | |||
| See: Yellow Pages | See: Yellow Pages | |||
| zone | zone | |||
| A logical group of network devices. | A logical group of network devices. | |||
| skipping to change at page 59, line 41 ¶ | skipping to change at page 61, line 41 ¶ | |||
| A Beginner's Guide to Global Networking", Addison-Wesley, | A Beginner's Guide to Global Networking", Addison-Wesley, | |||
| Reading, MA, 1992. | Reading, MA, 1992. | |||
| NWNET Kochmer, Jonathan, and NorthWestNet, "The Internet Passport: | NWNET Kochmer, Jonathan, and NorthWestNet, "The Internet Passport: | |||
| NorthWestNets Guide to Our World Online", NorthWestNet, | NorthWestNets Guide to Our World Online", NorthWestNet, | |||
| Bellevue, WA, 1992. | Bellevue, WA, 1992. | |||
| RFC1208 Jacobsen, O., D. Lynch, "A Glossary of Networking Terms", RFC | RFC1208 Jacobsen, O., D. Lynch, "A Glossary of Networking Terms", RFC | |||
| 1208, Interop, Inc., March 1991. | 1208, Interop, Inc., March 1991. | |||
| STD1 Postel, J., "IAB Official Protocol Standards", RFC 1360 (STD | STD1 Postel, J., "INTERNET OFFICIAL PROTOCOL STANDARDS", RFC 1920 | |||
| 1), Internet Architecture Board, September 1992. | (STD 1), March 1996. | |||
| STD2 Reynolds, J., J. Postel, "Assigned Numbers", RFC 1340 (STD | STD2 Reynolds, J., J. Postel, "ASSIGNED NUMBERS", RFC 1700 (STD | |||
| 2), ISI, July 1992. | 2), ISI, October 1994. | |||
| TAN Tanenbaum, Andrew S., "Computer Networks; 2nd ed.", Prentice | TAN Tanenbaum, Andrew S., "Computer Networks; 2nd ed.", Prentice | |||
| Hall, Englewood Cliffs, NJ, 1989. | Hall, Englewood Cliffs, NJ, 1989. | |||
| ZEN Kehoe, Brendan P., "Zen and the Art of the Internet", | ZEN Kehoe, Brendan P., "Zen and the Art of the Internet", | |||
| February 1992. | February 1992. | |||
| Security Considerations | Security Considerations | |||
| While security is not explicitly discussed in this document, some of | While security is not explicitly discussed in this document, some of | |||
| End of changes. 72 change blocks. | ||||
| 128 lines changed or deleted | 229 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||