< draft-ietf-userglos-glossary2-00.txt   draft-ietf-userglos-glossary2-01.txt >
draft-ietf-userglos-glossary2-00.txt G. Malkin / Xylogics, Inc. draft-ietf-userglos-glossary2-01.txt G. Malkin / Xylogics, Inc.
Obsoletes RFC 1392 (FYI 18) February 1996 Obsoletes RFC 1392 (FYI 18) May 1996
Internet Users' Glossary Internet Users' Glossary
Status of this Memo Status of this Memo
This document is an Internet-Draft. Internet-Drafts are working This document is an Internet-Draft. Internet-Drafts are working
documents of the Internet Engineering Task Force (IETF), its areas, documents of the Internet Engineering Task Force (IETF), its areas,
and its working groups. Note that other groups may also distribute and its working groups. Note that other groups may also distribute
working documents as Internet-Drafts. working documents as Internet-Drafts.
skipping to change at page 1, line 36 skipping to change at page 1, line 36
Abstract Abstract
There are many networking glossaries in existence. This glossary There are many networking glossaries in existence. This glossary
concentrates on terms which are specific to the Internet. Naturally, concentrates on terms which are specific to the Internet. Naturally,
there are entries for some basic terms and acronyms because other there are entries for some basic terms and acronyms because other
entries refer to them. entries refer to them.
Acknowledgements Acknowledgements
This document is the work of the User Glossary Working Group of the This document is the work of the User Glossary Working Group of the
User Services Area of the Internet Engineering Task Force. User Services Area of the Internet Engineering Task Force. I would
especially like to thank Ryan Moats/InterNIC for his careful review
and many contributions to this document.
Table of Contents Table of Contents
non-letter . . 3 I . . . . . . . 26 R . . . . . . . 45 non-letter . . 3 I . . . . . . . 26 R . . . . . . . 46
A . . . . . . . 3 J . . . . . . . 33 S . . . . . . . 48 A . . . . . . . 3 J . . . . . . . 33 S . . . . . . . 49
B . . . . . . . 8 K . . . . . . . 33 T . . . . . . . 51 B . . . . . . . 8 K . . . . . . . 33 T . . . . . . . 52
C . . . . . . . 11 L . . . . . . . 33 U . . . . . . . 54 C . . . . . . . 11 L . . . . . . . 33 U . . . . . . . 55
D . . . . . . . 15 M . . . . . . . 35 V . . . . . . . 55 D . . . . . . . 15 M . . . . . . . 35 V . . . . . . . 57
E . . . . . . . 18 N . . . . . . . 38 W . . . . . . . 56 E . . . . . . . 18 N . . . . . . . 39 W . . . . . . . 57
F . . . . . . . 20 O . . . . . . . 42 X . . . . . . . 57 F . . . . . . . 20 O . . . . . . . 43 X . . . . . . . 59
G . . . . . . . 23 P . . . . . . . 42 Y . . . . . . . 58 G . . . . . . . 23 P . . . . . . . 43 Y . . . . . . . 60
H . . . . . . . 24 Q . . . . . . . 45 Z . . . . . . . 58 H . . . . . . . 24 Q . . . . . . . 46 Z . . . . . . . 60
References . . . . . . . . . . . . . . . . . . . . . . . . . . 59 References . . . . . . . . . . . . . . . . . . . . . . . . . . 61
Security Considerations . . . . . . . . . . . . . . . . . . . . 60 Security Considerations . . . . . . . . . . . . . . . . . . . . 62
Editors' Addresses . . . . . . . . . . . . . . . . . . . . . . 60 Editors' Addresses . . . . . . . . . . . . . . . . . . . . . . 62
Glossary Glossary
10Base2 10Base2
A physical layer communications specification for 10Mbps, baseband A physical layer communications specification for 10Mbps, baseband
data transmission over a coaxial cable (Thinnet) with a maximum data transmission over a coaxial cable (Thinnet) with a maximum
cable segment length of 200 meters. cable segment length of 200 meters.
10Base5 10Base5
A physical layer communications specification for 10Mbps, baseband A physical layer communications specification for 10Mbps, baseband
skipping to change at page 4, line 11 skipping to change at page 4, line 11
syntax. This language is also used to encode SNMP packets. ASN.1 syntax. This language is also used to encode SNMP packets. ASN.1
is defined in ISO documents 8824.2 and 8825.2. See also: Basic is defined in ISO documents 8824.2 and 8825.2. See also: Basic
Encoding Rules. Encoding Rules.
Acceptable Use Policy (AUP) Acceptable Use Policy (AUP)
Many transit networks have policies which restrict the use to Many transit networks have policies which restrict the use to
which the network may be put. For example, some networks may only which the network may be put. For example, some networks may only
be used for non-commercial purposes. Some AUPs limit the type of be used for non-commercial purposes. Some AUPs limit the type of
material which can be made available to the public (e.g., material which can be made available to the public (e.g.,
pornographic material). Enforcement of AUPs varies with the pornographic material). Enforcement of AUPs varies with the
network. See also: transit network. network. See also: netiquette.
Access Control List (ACL) Access Control List (ACL)
Most network security systems operate by allowing selective use of Most network security systems operate by allowing selective use of
services. An Access Control List is the usual means by which services. An Access Control List is the usual means by which
access to, and denial of, services is controlled. It is simply a access to, and denial of, services is controlled. It is simply a
list of the services available, each with a list of the hosts list of the services available, each with a list of the hosts
permitted to use the service. permitted to use the service.
ACK ACK
See: Acknowledgment See: Acknowledgment
skipping to change at page 4, line 36 skipping to change at page 4, line 36
Acknowledgement. Acknowledgement.
[Source: NNSC] [Source: NNSC]
ACL ACL
See: Access Control List See: Access Control List
AD AD
See: Administrative Domain See: Administrative Domain
address address
There are three types of addresses in common use within the There are four types of addresses in common use within the
Internet. They are email address; IP, internet or Internet Internet. They are email address; IP, internet or Internet
address; and hardware or MAC address. See also: email address, IP address; hardware or MAC address; and URL. See also: email
address, internet address, MAC address. address, IP address, internet address, MAC address, Uniform
Resource Locator.
address mask address mask
A bit mask used to identify which bits in an IP address correspond A bit mask used to identify which bits in an IP address correspond
to the network and subnet portions of the address. This mask is to the network and subnet portions of the address. This mask is
often referred to as the subnet mask because the network portion often referred to as the subnet mask because the network portion
of the address (i.e., the network mask) can be determined by the of the address (i.e., the network mask) can be determined by the
encoding inherent in an IP address. See also: Classless Inter- encoding inherent in an IP address. See also: Classless Inter-
domain Routing. domain Routing.
address resolution address resolution
Conversion of an internet address into the corresponding physical Conversion of a network-layer address (e.g. IP address) into the
address. corresponding physical address (e.g., MAC address). See also: IP
address, MAC address.
Address Resolution Protocol (ARP) Address Resolution Protocol (ARP)
Used to dynamically discover the low level physical network Used to dynamically discover the low level physical network
hardware address that corresponds to the high level IP address for hardware address that corresponds to the high level IP address for
a given host. ARP is limited to physical network systems that a given host. ARP is limited to physical network systems that
support broadcast packets that can be heard by all hosts on the support broadcast packets that can be heard by all hosts on the
network. See also: proxy ARP. network. See also: proxy ARP, Reverse Address Resolution
Protocol.
Administrative Domain (AD) Administrative Domain (AD)
A collection of hosts and routers, and the interconnecting A collection of hosts and routers, and the interconnecting
network(s), managed by a single administrative authority. network(s), managed by a single administrative authority.
Advanced Research Projects Agency (ARPA) Advanced Research Projects Agency (ARPA)
An agency of the U.S. Department of Defense responsible for the An agency of the U.S. Department of Defense responsible for the
development of new technology for use by the military. ARPA development of new technology for use by the military. ARPA
(formerly known as DARPA, nee ARPA) was responsible for funding (formerly known as DARPA, nee ARPA) was responsible for funding
much of the development of the Internet we know today, including much of the development of the Internet we know today, including
skipping to change at page 7, line 46 skipping to change at page 7, line 48
case, current information can be obtained from the Internet case, current information can be obtained from the Internet
Assigned Numbers Authority (IANA). If you are developing a Assigned Numbers Authority (IANA). If you are developing a
protocol or application that will require the use of a link, protocol or application that will require the use of a link,
socket, port, protocol, etc., please contact the IANA to receive a socket, port, protocol, etc., please contact the IANA to receive a
number assignment. See also: Internet Assigned Numbers Authority, number assignment. See also: Internet Assigned Numbers Authority,
STD. STD.
[Source: STD2] [Source: STD2]
Asynchronous Transfer Mode (ATM) Asynchronous Transfer Mode (ATM)
A standard which defines high-load, high-speed (1.544Mbps through A standard which defines high-load, high-speed (1.544Mbps through
1.2 Gbps), fixed-size packet (cell) switching with dynamic 1.2Gbps), fixed-size packet (cell) switching with dynamic
bandwidth allocation. ATM is also known as "fast packet." bandwidth allocation. ATM is also known as "fast packet."
ATM ATM
See: Asynchronous Transfer Mode See: Asynchronous Transfer Mode
AUP AUP
See: Acceptable Use Policy See: Acceptable Use Policy
authentication authentication
The verification of the identity of a person or process. The verification of the identity of a person or process.
skipping to change at page 10, line 5 skipping to change at page 10, line 8
binary binary
11001001 11001001
BIND BIND
See: Berkeley Internet Name Domain See: Berkeley Internet Name Domain
Birds Of a Feather (BOF) Birds Of a Feather (BOF)
A Birds Of a Feather (flocking together) is an informal discussion A Birds Of a Feather (flocking together) is an informal discussion
group. It is formed, often ad hoc, to consider a specific issue group. It is formed, often ad hoc, to consider a specific issue
and, therefore, has a narrow focus. and, therefore, has a narrow focus. See also: Working Group.
Bitnet Bitnet
An academic computer network that provides interactive electronic An academic computer network that provides interactive electronic
mail and file transfer services, using a store-and-forward mail and file transfer services, using a store-and-forward
protocol, based on IBM Network Job Entry protocols. Bitnet-II protocol, based on IBM Network Job Entry protocols. Bitnet-II
encapsulates the Bitnet protocol within IP packets and depends on encapsulates the Bitnet protocol within IP packets and depends on
the Internet to route them. the Internet to route them.
BOF BOF
See: Birds Of a Feather See: Birds Of a Feather
skipping to change at page 12, line 6 skipping to change at page 12, line 11
CERT CERT
See: Computer Emergency Response Team See: Computer Emergency Response Team
checksum checksum
A computed value which is dependent upon the contents of a packet. A computed value which is dependent upon the contents of a packet.
This value is sent along with the packet when it is transmitted. This value is sent along with the packet when it is transmitted.
The receiving system computes a new checksum based upon the The receiving system computes a new checksum based upon the
received data and compares this value with the one sent with the received data and compares this value with the one sent with the
packet. If the two values are the same, the receiver has a high packet. If the two values are the same, the receiver has a high
degree of confidence that the data was received correctly. degree of confidence that the data was received correctly. See
also: Cyclic Redundancy Check.
[Source: NNSC] [Source: NNSC]
CIDR CIDR
See: Classless Inter-domain Routing See: Classless Inter-domain Routing
circuit switching circuit switching
A communications paradigm in which a dedicated communication path A communications paradigm in which a dedicated communication path
is established between two hosts, and on which all packets travel. is established between two hosts, and on which all packets travel.
The telephone system is an example of a circuit switched network. The telephone system is an example of a circuit switched network.
See also: connection-oriented, connectionless, packet switching. See also: connection-oriented, connectionless, packet switching.
skipping to change at page 12, line 44 skipping to change at page 12, line 50
A common way to describe the paradigm of many network protocols. A common way to describe the paradigm of many network protocols.
Examples include the name-server/name-resolver relationship in DNS Examples include the name-server/name-resolver relationship in DNS
and the file-server/file-client relationship in NFS. See also: and the file-server/file-client relationship in NFS. See also:
client, server, Domain Name System, Network File System. client, server, Domain Name System, Network File System.
CNI CNI
See: Coalition for Networked Information See: Coalition for Networked Information
Coalition for Networked Information (CNI) Coalition for Networked Information (CNI)
A consortium formed by American Research Libraries, CAUSE, and A consortium formed by American Research Libraries, CAUSE, and
EDUCOM to promote the creation of, and access to, information EDUCOM (no, they are not acronyms) to promote the creation of, and
resources in networked environments in order to enrich scholarship access to, information resources in networked environments in
and enhance intellectual productivity. order to enrich scholarship and enhance intellectual productivity.
Comite Consultatif International de Telegraphique et Telephonique Comite Consultatif International de Telegraphique et Telephonique (
(CCITT) CCITT)
This organization is part of the International Telecommunications This organization is now part of the International
Union (ITU) and is responsible for making technical Telecommunications Union and is responsible for making technical
recommendations about telephone and data communications systems. recommendations about telephone and data communications systems.
Every four years CCITT holds plenary sessions where they adopt new Every four years CCITT holds plenary sessions where they adopt new
standards; the most recent was in 1992. Recently, the ITU standards; the most recent was in 1992. Recently, the ITU
reorganized and CCITT was renamed the ITU-TSS. See also: reorganized and CCITT was renamed the ITU-TSS. See also:
International Telecommunications Union - Telecommunications International Telecommunications Union - Telecommunications
Standards Sector. Standards Sector.
[Source: NNSC]
Computer Emergency Response Team (CERT) Computer Emergency Response Team (CERT)
The CERT was formed by ARPA in November 1988 in response to the The CERT was formed by ARPA in November 1988 in response to the
needs exhibited during the Internet worm incident. The CERT needs exhibited during the Internet worm incident. The CERT
charter is to work with the Internet community to facilitate its charter is to work with the Internet community to facilitate its
response to computer security events involving Internet hosts, to response to computer security events involving Internet hosts, to
take proactive steps to raise the community's awareness of take proactive steps to raise the community's awareness of
computer security issues, and to conduct research targeted at computer security issues, and to conduct research targeted at
improving the security of existing systems. CERT products and improving the security of existing systems. CERT products and
services include 24-hour technical assistance for responding to services include 24-hour technical assistance for responding to
skipping to change at page 15, line 11 skipping to change at page 15, line 15
Cyberspace Cyberspace
A term coined by William Gibson in his fantasy novel Neuromancer A term coined by William Gibson in his fantasy novel Neuromancer
to describe the "world" of computers, and the society that gathers to describe the "world" of computers, and the society that gathers
around them. around them.
[Source: ZEN] [Source: ZEN]
Cyclic Redundancy Check (CRC) Cyclic Redundancy Check (CRC)
A number derived from a set of data that will be transmitted. By A number derived from a set of data that will be transmitted. By
recalculating the CRC at the remote end and comparing it to the recalculating the CRC at the remote end and comparing it to the
value originally transmitted, the receiving node can detect some value originally transmitted, the receiving node can detect some
types of transmission errors. types of transmission errors. See also: checksum.
[Source: MALAMUD] [Source: MALAMUD]
DANTE DANTE
A non-profit company founded in July 1993 to help the European A non-profit company founded in July 1993 to help the European
research community enhance their networking facilities. If research community enhance their networking facilities. It
focuses on the establishment of a high-speed computer network focuses on the establishment of a high-speed computer network
infrastructure. infrastructure.
DARPA DARPA
Defense Advanced Research Projects Agency Defense Advanced Research Projects Agency
See: Advanced Research Projects Agency See: Advanced Research Projects Agency
Data Encryption Key (DEK) Data Encryption Key (DEK)
Used for the encryption of message text and for the computation of Used for the encryption of message text and for the computation of
message integrity checks (signatures). See also: encryption. message integrity checks (signatures). See also: encryption.
skipping to change at page 16, line 51 skipping to change at page 17, line 7
See also: Defense Data Network. See also: Defense Data Network.
DEK DEK
See: Data Encryption Key See: Data Encryption Key
DES DES
See: Data Encryption Standard See: Data Encryption Standard
dialup dialup
A temporary, as opposed to dedicated, connection between machines A temporary, as opposed to dedicated, connection between machines
established over a standard phone line. established over a phone line (analog or ISDN). See also:
Integrated Services Digital Network.
Directory Access Protocol Directory Access Protocol
X.500 protocol used for communication between a Directory User X.500 protocol used for communication between a Directory User
Agent and a Directory System Agent. Agent and a Directory System Agent.
[Source: MALAMUD] [Source: MALAMUD]
Directory System Agent (DSA) Directory System Agent (DSA)
The software that provides the X.500 Directory Service for a The software that provides the X.500 Directory Service for a
portion of the directory information base. Generally, each DSA is portion of the directory information base. Generally, each DSA is
responsible for the directory information for a single responsible for the directory information for a single
skipping to change at page 18, line 10 skipping to change at page 18, line 15
context. See also: Administrative Domain, Domain Name System. context. See also: Administrative Domain, Domain Name System.
Domain Name System (DNS) Domain Name System (DNS)
The DNS is a general purpose distributed, replicated, data query The DNS is a general purpose distributed, replicated, data query
service. The principal use is the lookup of host IP addresses service. The principal use is the lookup of host IP addresses
based on host names. The style of host names now used in the based on host names. The style of host names now used in the
Internet is called "domain name", because they are the style of Internet is called "domain name", because they are the style of
names used to look up anything in the DNS. Some important domains names used to look up anything in the DNS. Some important domains
are: .COM (commercial), .EDU (educational), .NET (network are: .COM (commercial), .EDU (educational), .NET (network
operations), .GOV (U.S. government), and .MIL (U.S. military). operations), .GOV (U.S. government), and .MIL (U.S. military).
Most countries also have a domain. For example, .US (United Most countries also have a domain. The country domain names are
States), .UK (United Kingdom), .AU (Australia). See also: Fully based on ISO 3166. For example, .US (United States), .UK (United
Qualified Domain Name. Kingdom), .AU (Australia). See also: Fully Qualified Domain Name,
Mail Exchange Record.
dot address (dotted decimal notation) dot address (dotted decimal notation)
Dot address refers to the common notation for IP addresses of the Dot address refers to the common notation for IP addresses of the
form A.B.C.D; where each letter represents, in decimal, one byte form A.B.C.D; where each letter represents, in decimal, one byte
of a four byte IP address. See also: IP address. of a four byte IP address. See also: IP address.
[Source: FYI4] [Source: FYI4]
DS1
A framing specification for T-1 synchronous lines. See also: T1,
E1.
DS3
A framing specification for T-3 synchronous lines. See also: T3,
E3.
DSA DSA
See: Directory System Agent See: Directory System Agent
DTE DTE
Data Terminal Equipment Data Terminal Equipment
DUA DUA
See: Directory User Agent See: Directory User Agent
dynamic adaptive routing dynamic adaptive routing
Automatic rerouting of traffic based on a sensing and analysis of Automatic rerouting of traffic based on a sensing and analysis of
current actual network conditions. NOTE: this does not include current actual network conditions. NOTE: this does not include
cases of routing decisions taken on predefined information. cases of routing decisions taken on predefined information.
[Source: J. Postel] [Source: J. Postel]
E1 E1
The European version of T1 operating at 2.048Mbps. The basic building block for European multi-megabit data rates,
with a bandwidth of 2.048Mbps. See also: T1.
E3 E3
The European version of T3 operating at 59.352Mbps. A European standard for transmitting data at 57.344Mbps. See
also: T3.
EARN EARN
See: European Academic and Research Network European Academic and Research Network. See: Trans-European
Research and Education Networking Association.
EBCDIC EBCDIC
See: Extended Binary Coded Decimal Interchange Code See: Extended Binary Coded Decimal Interchange Code
Ebone Ebone
A pan-European backbone service. A pan-European backbone service.
EFF EFF
See: Electronic Frontier Foundation See: Electronic Frontier Foundation
FLEA
See: Four Letter Extended Acronym
EGP EGP
See: Exterior Gateway Protocol See: Exterior Gateway Protocol
Electronic Frontier Foundation (EFF) Electronic Frontier Foundation (EFF)
A foundation established to address social and legal issues A foundation established to address social and legal issues
arising from the impact on society of the increasingly pervasive arising from the impact on society of the increasingly pervasive
use of computers as a means of communication and information use of computers as a means of communication and information
distribution. distribution.
Electronic Mail (email) Electronic Mail (email)
skipping to change at page 19, line 45 skipping to change at page 19, line 42
email address email address
The domain-based or UUCP address that is used to send electronic The domain-based or UUCP address that is used to send electronic
mail to a specified destination. For example an editor's address mail to a specified destination. For example an editor's address
is "gmalkin@xylogics.com". See also: bang path, mail path, UNIX- is "gmalkin@xylogics.com". See also: bang path, mail path, UNIX-
to-UNIX CoPy. to-UNIX CoPy.
[Source: ZEN] [Source: ZEN]
encapsulation encapsulation
The technique used by layered protocols in which a layer adds The technique used by layered protocols in which a layer adds
header information to the protocol data unit (PDU) from the layer header information to the protocol data unit (PDU) from the layer
above. As an example, in Internet terminology, a packet would above. For example, in Internet terminology, a packet would
contain a header from the physical layer, followed by a header contain a header from the physical layer, followed by a header
from the datalink layer (e.g. Ethernet), followed by a header
from the network layer (IP), followed by a header from the from the network layer (IP), followed by a header from the
transport layer (TCP), followed by the application protocol data. transport layer (e.g. TCP), followed by the application protocol
data.
[Source: RFC1208] [Source: RFC1208]
encryption encryption
Encryption is the manipulation of a packet's data in order to Encryption is the manipulation of a packet's data in order to
prevent any but the intended recipient from reading that data. prevent any but the intended recipient from reading that data.
There are many types of data encryption, and they are the basis of There are many types of data encryption, and they are the basis of
network security. See also: Data Encryption Standard. network security. See also: Data Encryption Standard.
error checking
The examination of received data for transmission errors. See
also: checksum, Cyclic Redundancy Check.
Ethernet Ethernet
A 10-Mb/s standard for LANs, initially developed by Xerox, and A 10-Mb/s standard for LANs, initially developed by Xerox, and
later refined by Digital, Intel and Xerox (DIX). All hosts are later refined by Digital, Intel and Xerox (DIX). All hosts are
connected to a coaxial cable where they contend for network access connected to a coaxial cable where they contend for network access
using a Carrier Sense Multiple Access with Collision Detection using a Carrier Sense Multiple Access with Collision Detection
(CSMA/CD) paradigm. See also: 802.x, Local Area Network, token (CSMA/CD) paradigm. See also: 802.x, Local Area Network, token
ring. ring.
Ethernet meltdown Ethernet meltdown
An event that causes saturation, or near saturation, on an An event that causes saturation, or near saturation, on an
Ethernet. It usually results from illegal or misrouted packets Ethernet. It usually results from illegal or misrouted packets
and typically lasts only a short time. See also: broadcast storm. and typically lasts only a short time. See also: broadcast storm.
[Source: COMER] [Source: COMER]
European Academic and Research Network (EARN)
A network connecting European academic and research institutions
with electronic mail and file transfer services using the Bitnet
protocol. See also: Bitnet
Extended Binary Coded Decimal Interchange Code (EBCDIC) Extended Binary Coded Decimal Interchange Code (EBCDIC)
A standard character-to-number encoding used primarily by IBM A standard character-to-number encoding used primarily by IBM
computer systems. See also: ASCII. computer systems. See also: ASCII.
Four Letter Extended Acronym (FLEA)
A recognition of the fact that there are far too many TLAs. See
also: Three Letter Acronym.
Exterior Gateway Protocol (EGP) Exterior Gateway Protocol (EGP)
A protocol which distributes routing information to the routers A protocol which distributes routing information to the routers
which connect autonomous systems. The term "gateway" is which connect autonomous systems. The term "gateway" is
historical, as "router" is currently the preferred term. There is historical, as "router" is currently the preferred term. There is
also a routing protocol called EGP defined in RFC 904. See also: also a routing protocol called EGP defined in RFC 904. See also:
Autonomous System, Border Gateway Protocol, Interior Gateway Autonomous System, Border Gateway Protocol, Interior Gateway
Protocol. Protocol.
eXternal Data Representation (XDR) eXternal Data Representation (XDR)
A standard for machine independent data structures developed by A standard for machine independent data structures developed by
skipping to change at page 21, line 43 skipping to change at page 21, line 39
network. See also: File Transfer Protocol, Kermit, Gopher, World network. See also: File Transfer Protocol, Kermit, Gopher, World
Wide Web. Wide Web.
File Transfer Protocol (FTP) File Transfer Protocol (FTP)
A protocol which allows a user on one host to access, and transfer A protocol which allows a user on one host to access, and transfer
files to and from, another host over a network. Also, FTP is files to and from, another host over a network. Also, FTP is
usually the name of the program the user invokes to execute the usually the name of the program the user invokes to execute the
protocol. See also: anonymous FTP. protocol. See also: anonymous FTP.
finger finger
A program that displays information about a particular user, or A protocol, defined in RFC 1288, that allows information about a
all users, logged on the local system or on a remote system. It system or user on a system to be retrived. Finger also refers to
typically shows full name, last login time, idle time, terminal the commonly used program which retrieves this information.
line, and terminal location (where applicable). It may also Information about all logged in users, as well is information
display plan and project files left by the user. about specific users may be retrieved from local or remote
systems. Some sites consider finger to be a security risk and
have either disabled it, or replaced it with a simple message.
FIX FIX
See: Federal Information Exchange See: Federal Information Exchange
flame flame
A strong opinion and/or criticism of something, usually as a frank A strong opinion and/or criticism of something, usually as a frank
inflammatory statement, in an electronic mail message. It is inflammatory statement, in an electronic mail message. It is
common to precede a flame with an indication of pending fire (i.e. common to precede a flame with an indication of pending fire (i.e.
FLAME ON!). Flame Wars occur when people start flaming other FLAME ON!). Flame Wars occur when people start flaming other
people for flaming when they shouldn't have. See also: Electronic people for flaming when they shouldn't have. See also: Electronic
Mail, Usenet. Mail, Usenet.
FLEA
See: Four Letter Extended Acronym
FNC FNC
See: Federal Networking Council See: Federal Networking Council
Four Letter Extended Acronym (FLEA)
A recognition of the fact that there are far too many TLAs. See
also: Three Letter Acronym.
FQDN FQDN
See: Fully Qualified Domain Name See: Fully Qualified Domain Name
fragment fragment
A piece of a packet. When a router is forwarding an IP packet to A piece of a packet. When a router is forwarding an IP packet to
a network that has a maximum packet size smaller than the packet a network that has a maximum transmission unit smaller than the
size, it is forced to break up that packet into multiple packet size, it is forced to break up that packet into multiple
fragments. These fragments will be reassembled by the IP layer at fragments. These fragments will be reassembled by the IP layer at
the destination host. the destination host. See also: Maximum Transmission Unit.
fragmentation fragmentation
The IP process in which a packet is broken into smaller pieces to The IP process in which a packet is broken into smaller pieces to
fit the requirements of a physical network over which the packet fit the requirements of a physical network over which the packet
must pass. See also: reassembly. must pass. See also: reassembly.
frame frame
A frame is a datalink layer "packet" which contains the header and A frame is a datalink layer "packet" which contains the header and
trailer information required by the physical medium. That is, trailer information required by the physical medium. That is,
network layer packets are encapsulated to become frames. See network layer packets are encapsulated to become frames. See
skipping to change at page 23, line 16 skipping to change at page 23, line 20
FYI FYI
For Your Information For Your Information
FYI FYI
A subseries of RFCs that are not technical standards or A subseries of RFCs that are not technical standards or
descriptions of protocols. FYIs convey general information about descriptions of protocols. FYIs convey general information about
topics related to TCP/IP or the Internet. See also: Request For topics related to TCP/IP or the Internet. See also: Request For
Comments. Comments.
gross
A dozen dozen (144).
gated gated
Gatedaemon. A program which supports multiple routing protocols Gatedaemon. A program which supports multiple routing protocols
and protocol families. It may be used for routing, and makes an and protocol families. It may be used for routing, and makes an
effective platform for routing protocol research. The software is effective platform for routing protocol research. The software is
freely available by anonymous FTP from "gated.cornell.edu". freely available by anonymous FTP from "gated.cornell.edu".
Pronounced "gate-dee". See also: Exterior Gateway Protocol, Open Pronounced "gate-dee". See also: Exterior Gateway Protocol, Open
Shortest-Path First, Routing Information Protocol, routed. Shortest-Path First, Routing Information Protocol, routed.
gateway gateway
The term "router" is now used in place of the original definition The term "router" is now used in place of the original definition
of "gateway". Currently, a gateway is a communications of "gateway". Currently, a gateway is a communications
device/program which passes data between networks having similar device/program which passes data between networks having similar
functions but dissimilar implementations. This should not be functions but dissimilar implementations. This should not be
confused with a protocol converter. By this definition, a router confused with a protocol converter. By this definition, a router
is a layer 3 (network layer) gateway, and a mail gateway is a is a layer 3 (network layer) gateway, and a mail gateway is a
layer 7 (application layer) gateway. See also: mail gateway, layer 7 (application layer) gateway. See also: mail gateway,
router, protocol converter. router, protocol converter.
Gopher Gopher
A distributed information service that makes available A distributed information service, developed at the University of
hierarchical collections of information across the Internet. Minnesota, that makes hierarchical collections of information
Gopher uses a simple protocol that allows a single Gopher client available across the Internet. Gopher uses a simple protocol,
to access information from any accessible Gopher server, providing defined in RFC 1436, that allows a single Gopher client to access
the user with a single "Gopher space" of information. Public information from any accessible Gopher server, providing the user
domain versions of the client and server are available. See also: with a single "Gopher space" of information. Public domain
versions of the client and server are available. See also:
archie, archive site, Prospero, Wide Area Information Servers. archie, archive site, Prospero, Wide Area Information Servers.
GOSIP GOSIP
See: Government OSI Profile See: Government OSI Profile
Government OSI Profile (GOSIP) Government OSI Profile (GOSIP)
A subset of OSI standards specific to U.S. Government A subset of OSI standards specific to U.S. Government
procurements, designed to maximize interoperability in areas where procurements, designed to maximize interoperability in areas where
plain OSI standards are ambiguous or allow excessive options. plain OSI standards are ambiguous or allow excessive options.
hacker hacker
A person who delights in having an intimate understanding of the A person who delights in having an intimate understanding of the
internal workings of a system, computers and computer networks in internal workings of a system, computers and computer networks in
particular. The term is often misused in a pejorative context, particular. The term is often misused in a pejorative context,
where "cracker" would be the correct term. See also: cracker. where "cracker" would be the correct term. See also: cracker.
header header
The portion of a packet, preceding the actual data, containing The portion of a packet, preceding the actual data, containing
source and destination addresses, and error checking and other source and destination information. It may also error checking and
fields. A header is also the part of an electronic mail message other fields. A header is also the part of an electronic mail
that precedes the body of a message and contains, among other message which precedes the body of a message and contains, among
things, the message originator, date and time. See also: other things, the message originator, date and time. See also:
Electronic Mail, packet. Electronic Mail, packet, error checking.
heterogeneous network heterogeneous network
A network running multiple network layer protocols. See also: A network running multiple network layer protocols. See also:
DECnet, IP, IPX, XNS, homogeneous network. DECnet, IP, IPX, XNS, homogeneous network.
hierarchical routing hierarchical routing
The complex problem of routing on large networks can be simplified The complex problem of routing on large networks can be simplified
by reducing the size of the networks. This is accomplished by by reducing the size of the networks. This is accomplished by
breaking a network into a hierarchy of networks, where each level breaking a network into a hierarchy of networks, where each level
is responsible for its own routing. The Internet has, basically, is responsible for its own routing. The Internet has, basically,
skipping to change at page 28, line 14 skipping to change at page 28, line 14
International Organization for Standardization (ISO) International Organization for Standardization (ISO)
A voluntary, nontreaty organization founded in 1946 which is A voluntary, nontreaty organization founded in 1946 which is
responsible for creating international standards in many areas, responsible for creating international standards in many areas,
including computers and communications. Its members are the including computers and communications. Its members are the
national standards organizations of the 89 member countries, national standards organizations of the 89 member countries,
including ANSI for the U.S. See also: American National Standards including ANSI for the U.S. See also: American National Standards
Institute, Open Systems Interconnection. Institute, Open Systems Interconnection.
[Source: TAN] [Source: TAN]
International Telecommunications Union International Telecommunications Union (ITU)
An agency of the United Nations which coordinates the various An agency of the United Nations which coordinates the various
national telecommunications standards so that people in one national telecommunications standards so that people in one
country can communicate with people in another country. country can communicate with people in another country.
International Telecommunications Union - International Telecommunications Union -
Telecommunications Standards Sector (ITU-TSS) Telecommunications Standards Sector (ITU-TSS)
The new name for CCITT since the ITU reorganization. The function The new name for CCITT since the ITU reorganization. The function
is the same; only the name has been changed is the same; only the name has been changed
internet internet
skipping to change at page 33, line 14 skipping to change at page 33, line 14
Pronounced eye-so-dee-eee. See also: Open Systems Pronounced eye-so-dee-eee. See also: Open Systems
Interconnection, TCP/IP Protocol Suite. Interconnection, TCP/IP Protocol Suite.
ISOC ISOC
See: Internet Society See: Internet Society
ISODE ISODE
See: ISO Development Environment See: ISO Development Environment
ITU
See: International Telecommunications Union -
Telecommunications Standards Sector
ITU-TSS
See: International Telecommunications Union
JKREY JKREY
Joyce K. Reynolds Joyce K. Reynolds
KA9Q KA9Q
A popular implementation of TCP/IP and associated protocols for A popular implementation of TCP/IP and associated protocols for
amateur packet radio systems. See also: TCP/IP Protocol Suite. amateur packet radio systems. See also: TCP/IP Protocol Suite.
[Source: RFC1208] [Source: RFC1208]
Kerberos Kerberos
Kerberos is the security system of MIT's Project Athena. It is Kerberos is the security system of MIT's Project Athena. It is
skipping to change at page 33, line 38 skipping to change at page 33, line 45
Because Kermit runs in most operating environments, it provides an Because Kermit runs in most operating environments, it provides an
easy method of file transfer. Kermit is NOT the same as FTP. See easy method of file transfer. Kermit is NOT the same as FTP. See
also: File Transfer Protocol also: File Transfer Protocol
[Source: MALAMUD] [Source: MALAMUD]
Knowbot Knowbot
A "Knowledge Robot" is a program which seeks out information based A "Knowledge Robot" is a program which seeks out information based
on specified criteria. "Knowbot," as trademarked by CNRI, refers on specified criteria. "Knowbot," as trademarked by CNRI, refers
specifically to the search engine for Knowbot Information specifically to the search engine for Knowbot Information
Services. See also: Corporation for National Research Services. See also: Corporation for National Research
Initiatives. Initiatives, X.500, white pages, whois, netfind.
Knowbot Information Services Knowbot Information Services
An experimental directory service. See also: white pages, whois, An experimental directory service. See also: white pages, whois,
X.500. X.500.
LAN LAN
See: Local Area Network See: Local Area Network
layer layer
Communication networks for computers may be organized as a set of Communication networks for computers may be organized as a set of
skipping to change at page 34, line 15 skipping to change at page 34, line 22
protocols appropriate to the layer to communicate with each other. protocols appropriate to the layer to communicate with each other.
TCP/IP has five layers of protocols; OSI has seven. The TCP/IP has five layers of protocols; OSI has seven. The
advantages of different layers of protocols is that the methods of advantages of different layers of protocols is that the methods of
passing information from one layer to another are specified passing information from one layer to another are specified
clearly as part of the protocol suite, and changes within a clearly as part of the protocol suite, and changes within a
protocol layer are prevented from affecting the other layers. protocol layer are prevented from affecting the other layers.
This greatly simplifies the task of designing and maintaining This greatly simplifies the task of designing and maintaining
communication programs. See also: Open Systems Interconnection, communication programs. See also: Open Systems Interconnection,
TCP/IP Protocol Suite. TCP/IP Protocol Suite.
LDAP
See: Lightweight Directory Access Protocol
Lightweight Directory Access Protocol
This protocol provides access for management and browser
applications that provide read/write interactive access to the
X.500 Directory. See also: X.500.
link
A pointer which may be used to retreive the file or data to which
the pointer points.
list server list server
An automated mailing list distribution system. List servers An automated mailing list distribution system. List servers
handle the administrivia of mailing list maintenance, such as the handle the administrivia of mailing list maintenance, such as the
adding and deleting of list members. adding and deleting of list members.
little-endian little-endian
A format for storage or transmission of binary data in which the A format for storage or transmission of binary data in which the
least significant byte (bit) comes first. See also: big-endian. least significant byte (bit) comes first. See also: big-endian.
[Source: RFC1208] [Source: RFC1208]
LLC LLC
See: Logical Link Control See: Logical Link Control
Local Area Network (LAN) Local Area Network (LAN)
A data network intended to serve an area of only a few square A data network intended to serve an area of only a few square
kilometers or less. Because the network is known to cover only a kilometers or less. Because the network is known to cover only a
small area, optimizations can be made in the network signal small area, optimizations can be made in the network signal
protocols that permit data rates up to 100Mb/s. See also: protocols that permit data rates up to 100Mb/s. See also:
Ethernet, Fiber Distributed Data Interface, token ring, Wide Area Ethernet, Fiber Distributed Data Interface, token ring,
Network. Metropolitan Area Network, Wide Area Network.
[Source: NNSC] [Source: NNSC]
Logical Link Control (LLC) Logical Link Control (LLC)
The upper portion of the datalink layer, as defined in IEEE 802.2. The upper portion of the datalink layer, as defined in IEEE 802.2.
The LLC sublayer presents a uniform interface to the user of the The LLC sublayer presents a uniform interface to the user of the
datalink service, usually the network layer. Beneath the LLC datalink service, usually the network layer. Beneath the LLC
sublayer is the MAC sublayer. See also: 802.x, layer, Media sublayer is the MAC sublayer. See also: 802.x, layer, Media
Access Control. Access Control.
Lurking Lurking
No active participation on the part of a subscriber to an mailing No active participation on the part of a subscriber to an mailing
list or USENET newsgroup. A person who is lurking is just list or USENET newsgroup. A person who is lurking is just
listening to the discussion. Lurking is encouraged for beginners listening to the discussion. Lurking is encouraged for beginners
who need to get up to speed on the history of the group. See who need to get up to speed on the history of the group. See
also: Electronic Mail, mailing list, Usenet. also: Electronic Mail, mailing list, Usenet.
[Source: LAQUEY] [Source: LAQUEY]
Lycos
Lycos, Inc. is a new venture formed in late June 1995, to develop
and market the Lycos technology originally developed under the
direction of Dr. Michael ("Fuzzy") Mauldin at Carnegie Mellon
University. The part of Lycos you see when you do a search is the
search engine. "Lycos" comes from Lycosidae, a cosmopolitan
family of relatively large active ground spiders (Wolf Spiders)
that catch their prey by pursuit, rather than in a web.
[Source: Lycos's FAQ]
MAC MAC
See: Media Access Control See: Media Access Control
MAC address MAC address
The hardware address of a device connected to a shared media. See The hardware address of a device connected to a shared media. See
also: Media Access Control, Ethernet, token ring. also: Media Access Control, Ethernet, token ring.
[Source: MALAMUD] [Source: MALAMUD]
mail bridge mail bridge
A mail gateway that forwards electronic mail between two or more A mail gateway that forwards electronic mail between two or more
skipping to change at page 36, line 22 skipping to change at page 36, line 50
mailing list mailing list
A list of email addresses, used by a mail exploder, to forward A list of email addresses, used by a mail exploder, to forward
messages to groups of people. Generally, a mailing list is used messages to groups of people. Generally, a mailing list is used
to discuss certain set of topics, and different mailing lists to discuss certain set of topics, and different mailing lists
discuss different topics. A mailing list may be moderated. This discuss different topics. A mailing list may be moderated. This
means that messages sent to the list are actually sent to a means that messages sent to the list are actually sent to a
moderator who determines whether or not to send the messages on to moderator who determines whether or not to send the messages on to
everyone else. Requests to subscribe to, or leave, a mailing list everyone else. Requests to subscribe to, or leave, a mailing list
should ALWAYS be sent to the list's "-request" address (e.g. should ALWAYS be sent to the list's "-request" address (e.g.
ietf-request@cnri.reston.va.us for the IETF mailing list). See ietf-request@cnri.reston.va.us for the IETF mailing list) or
also: Electronic Mail, mail exploder. majordomo server. See also: Electronic Mail, mail exploder, email
address, moderator, majordomo.
majordomo
A program which handles mailing list maintenance (affectionately
known as administrivia) such as adding and removing addresses from
mailing lists. See also: email address, mailing list.
MAN MAN
See: Metropolitan Area Network See: Metropolitan Area Network
Management Information Base (MIB) Management Information Base (MIB)
The set of parameters an SNMP management station can query or set The set of parameters an SNMP management station can query or set
in the SNMP agent of a network device (e.g. router). Standard, in the SNMP agent of a network device (e.g. router). Standard,
minimal MIBs have been defined, and vendors often have Private minimal MIBs have been defined, and vendors often have Private
enterprise MIBs. In theory, any SNMP manager can talk to any SNMP enterprise MIBs. In theory, any SNMP manager can talk to any SNMP
agent with a properly defined MIB. See also: client-server model, agent with a properly defined MIB. See also: client-server model,
skipping to change at page 36, line 46 skipping to change at page 37, line 32
Martian Martian
A humorous term applied to packets that turn up unexpectedly on A humorous term applied to packets that turn up unexpectedly on
the wrong network because of bogus routing entries. Also used as the wrong network because of bogus routing entries. Also used as
a name for a packet which has an altogether bogus (non-registered a name for a packet which has an altogether bogus (non-registered
or ill-formed) internet address. or ill-formed) internet address.
[Source: RFC1208] [Source: RFC1208]
Maximum Transmission Unit (MTU) Maximum Transmission Unit (MTU)
The largest frame length which may be sent on a physical medium. The largest frame length which may be sent on a physical medium.
See also: fragmentation, frame. See also: frame, fragment, fragmentation.
mbone mbone
The Multicast Backbone is based on IP multicasting using class-D The Multicast Backbone is based on IP multicasting using class-D
addresses. The mbone concept was adopted at the March 1992 IETF addresses. The mbone concept was adopted at the March 1992 IETF
in San Diego, during which it was used to audiocast to 40 people in San Diego, during which it was used to audiocast to 40 people
throughout the world. At the following meeting, in Cambridge, the throughout the world. At the following meeting, in Cambridge, the
name mbone was adopted. Since then the audiocast has become full name mbone was adopted. Since then the audiocast has become full
two-way audio/video conferencing using two video channels, four two-way audio/video conferencing using two video channels, four
audio channels, and involving hundreds of remote users. See also: audio channels, and involving hundreds of remote users. See also:
multicast, Internet Engineering Task Force. multicast, Internet Engineering Task Force.
skipping to change at page 38, line 15 skipping to change at page 38, line 50
MNP MNP
See: Microcom Networking Protocol See: Microcom Networking Protocol
moderator moderator
A person, or small group of people, who manage moderated mailing A person, or small group of people, who manage moderated mailing
lists and newsgroups. Moderators are responsible for determining lists and newsgroups. Moderators are responsible for determining
which email submissions are passed on to list. See also: which email submissions are passed on to list. See also:
Electronic Mail, mailing list, Usenet. Electronic Mail, mailing list, Usenet.
MOSPF MOSPF
See: Open Shortest-Path First Multicast Open Shortest-Path First. See: Open Shortest-Path First.
MTU MTU
See: Maximum Transmission Unit See: Maximum Transmission Unit
MUD MUD
See: Multi-User Dungeon See: Multi-User Dungeon
multicast multicast
A packet with a special destination address which multiple nodes A packet with a special destination address which multiple nodes
on the network may be willing to receive. See also: broadcast, on the network may be willing to receive. See also: broadcast,
skipping to change at page 39, line 39 skipping to change at page 40, line 27
research. The NSFNET, funded by NSF, was once an essential part research. The NSFNET, funded by NSF, was once an essential part
of academic and research communications. It was a highspeed, of academic and research communications. It was a highspeed,
hierarchical "network of networks." At the highest level, it had hierarchical "network of networks." At the highest level, it had
a backbone network of nodes, interconnected with T3 (45Mbps) a backbone network of nodes, interconnected with T3 (45Mbps)
facilities which spaned the continental United States. Attached facilities which spaned the continental United States. Attached
to that were mid-level networks, and attached to the mid-levels to that were mid-level networks, and attached to the mid-levels
were campus and local networks. See also: backbone network, mid- were campus and local networks. See also: backbone network, mid-
level network. level network.
Negative Acknowledgment (NAK) Negative Acknowledgment (NAK)
Response to receipt of a corrupted packet of information. See Response to the receipt of either a corrupted or unnexpected
also: Acknowledgement. packet of information. See also: Acknowledgement.
netfind
A research prototype to provide a simple Internet "white pages"
user directory. Developed at the University of Colorado, Boulder,
it tries to locate telephone and email information given a
person's name and a rough description of where the person works.
See also: Knowbot, whois, white pages, X.500.
[Source: Ryan Moats]
netiquette netiquette
A pun on "etiquette" referring to proper behavior on a network. A pun on "etiquette" referring to proper behavior on a network.
RFC 1855 (FYI 28) contains a netiquette guide produced by the User
Services area of the IETF. See also: Acceptable Use Policy,
Internet Engineering Task Force.
Netnews Netnews
See: Usenet See: Usenet
network network
A computer network is a data communications system which A computer network is a data communications system which
interconnects computer systems at various different sites. A interconnects computer systems at various different sites. A
network may be composed of any combination of LANs, MANs or WANs. network may be composed of any combination of LANs, MANs or WANs.
See also: Local Area Network, Metropolitan Area Network, Wide Area See also: Local Area Network, Metropolitan Area Network, Wide Area
Network, internet. Network, internet.
skipping to change at page 41, line 16 skipping to change at page 42, line 16
[Source: NNSC] [Source: NNSC]
NFS NFS
See: Network File System See: Network File System
NIC NIC
See: Network Information Center See: Network Information Center
NIC.DDN.MIL NIC.DDN.MIL
This is the domain name of the DDN NIC. See also: Defense Data This is the domain name of the DDN NIC. See also: Defense Data
Network..., Domain Name System, Network Information Center. Network, Domain Name System, Network Information Center.
NIS NIS
See: Network Information Services See: Network Information Services
NIST NIST
See: National Institute of Standards and Technology See: National Institute of Standards and Technology
NNTP NNTP
See: Network News Transfer Protocol See: Network News Transfer Protocol
skipping to change at page 44, line 28 skipping to change at page 45, line 28
postmaster postmaster
The person responsible for taking care of electronic mail The person responsible for taking care of electronic mail
problems, answering queries about users, and other related work at problems, answering queries about users, and other related work at
a site. See also: Electronic Mail. a site. See also: Electronic Mail.
[Source: ZEN] [Source: ZEN]
PPP PPP
See: Point-to-Point Protocol See: Point-to-Point Protocol
Pretty Good Privacy Pretty Good Privacy (PGP)
A program which cryptographically protects files and electronic A program, developed by Phil Zimmerman, which cryptographically
mail from being read by others. It may also be used to digitally protects files and electronic mail from being read by others. It
sign a document or message, thus authenticating the creator. See may also be used to digitally sign a document or message, thus
also: encryption, Data Encryption Standard, RSA. authenticating the creator. See also: encryption, Data Encryption
Standard, RSA.
Privacy Enhanced Mail (PEM) Privacy Enhanced Mail (PEM)
Internet email which provides confidentiality, authentication and Internet email which provides confidentiality, authentication and
message integrity using various encryption methods. See also: message integrity using various encryption methods. See also:
Electronic Mail, encryption. Electronic Mail, encryption.
Prospero Prospero
A distributed filesystem which provides the user with the ability A distributed filesystem which provides the user with the ability
to create multiple views of a single collection of files to create multiple views of a single collection of files
distributed across the Internet. Prospero provides a file naming distributed across the Internet. Prospero provides a file naming
skipping to change at page 45, line 40 skipping to change at page 46, line 41
PSN PSN
See: Packet Switch Node. See: Packet Switch Node.
PTT PTT
See: Postal, Telegraph and Telephone See: Postal, Telegraph and Telephone
queue queue
A backup of packets awaiting processing. A backup of packets awaiting processing.
RARE RARE
See: Reseaux Associes pour la Recherche Europeenne Reseaux Associes pour la Recherche Europeenne. See: Trans-
European Research and Education Networking Association.
RARP RARP
See: Reverse Address Resolution Protocol See: Reverse Address Resolution Protocol
RBOC RBOC
Regional Bell Operating Company Regional Bell Operating Company
RCP Read The F*cking Manual (RTFM)
See: Remote copy program
Read the F*cking Manual (RTFM)
This acronym is often used when someone asks a simple or common This acronym is often used when someone asks a simple or common
question. question.
Read The Source Code (RTSC)
This acronym is often used when a software developer asks a
question about undocumented code.
reassembly reassembly
The IP process in which a previously fragmented packet is The IP process in which a previously fragmented packet is
reassembled before being passed to the transport layer. See also: reassembled before being passed to the transport layer. See also:
fragmentation. fragmentation.
recursive recursive
See: recursive See: recursive
regional regional
See: mid-level network See: mid-level network
skipping to change at page 46, line 48 skipping to change at page 48, line 5
The document series, begun in 1969, which describes the Internet The document series, begun in 1969, which describes the Internet
suite of protocols and related experiments. Not all (in fact very suite of protocols and related experiments. Not all (in fact very
few) RFCs describe Internet standards, but all Internet standards few) RFCs describe Internet standards, but all Internet standards
are written up as RFCs. The RFC series of documents is unusual in are written up as RFCs. The RFC series of documents is unusual in
that the proposed protocols are forwarded by the Internet research that the proposed protocols are forwarded by the Internet research
and development community, acting on their own behalf, as opposed and development community, acting on their own behalf, as opposed
to the formally reviewed and standardized protocols that are to the formally reviewed and standardized protocols that are
promoted by organizations such as CCITT and ANSI. See also: BCP, promoted by organizations such as CCITT and ANSI. See also: BCP,
FYI, STD. FYI, STD.
Reseaux Associes pour la Recherche Europeenne (RARE)
European association of research networks.
[Source: RFC1208]
Reseaux IP Europeenne (RIPE) Reseaux IP Europeenne (RIPE)
A collaboration between European networks which use the TCP/IP A collaboration between European networks which use the TCP/IP
protocol suite. protocol suite.
Reverse Address Resolution Protocol (RARP) Reverse Address Resolution Protocol (RARP)
A protocol, defined in RFC 903, which provides the reverse A protocol, defined in RFC 903, which provides the reverse
function of ARP. RARP maps a hardware (MAC) address to an function of ARP. RARP maps a hardware (MAC) address to an
internet address. It is used primarily by diskless nodes when internet address. It is used primarily by diskless nodes when
they first initialize to find their internet address. See also: they first initialize to find their internet address. See also:
Address Resolution Protocol, BOOTP, internet address, MAC address. Address Resolution Protocol, BOOTP, internet address, MAC address.
skipping to change at page 48, line 29 skipping to change at page 49, line 29
RPC RPC
See: Remote Procedure Call See: Remote Procedure Call
RSA RSA
A public-key cryptographic system which may be used for encryption A public-key cryptographic system which may be used for encryption
and authentication. It was invented in 1977 and named for its and authentication. It was invented in 1977 and named for its
inventors: Ron Rivest, Adi Shamir, and Leonard Adleman. See also: inventors: Ron Rivest, Adi Shamir, and Leonard Adleman. See also:
encryption, Data Encryption Standard, Pretty Good Privacy. encryption, Data Encryption Standard, Pretty Good Privacy.
RTFM RTFM
See: Read the F*cking Manual See: Read The F*cking Manual
RTSC
See: Read The Source Code
RTT RTT
See: Round-Trip Time See: Round-Trip Time
SDH
See: Synchronous Digital Hierarchy
Serial Line IP (SLIP) Serial Line IP (SLIP)
A protocol used to run IP over serial lines, such as telephone A protocol used to run IP over serial lines, such as telephone
circuits or RS-232 cables, interconnecting two systems. SLIP is circuits or RS-232 cables, interconnecting two systems. SLIP is
defined in RFC 1055, but is not an Internet Standard. It is being defined in RFC 1055, but is not an Internet Standard. It is being
replaced by PPP. See also: Point-to-Point Protocol. replaced by PPP. See also: Point-to-Point Protocol.
server server
A provider of resources (e.g. file servers and name servers). See A provider of resources (e.g. file servers and name servers). See
also: client, Domain Name System, Network File System. also: client, Domain Name System, Network File System.
skipping to change at page 50, line 18 skipping to change at page 51, line 26
A type of transport service that allows its client to send data in A type of transport service that allows its client to send data in
a continuous stream. The transport service will guarantee that a continuous stream. The transport service will guarantee that
all data will be delivered to the other end in the same order as all data will be delivered to the other end in the same order as
sent and without duplicates. See also: Transmission Control sent and without duplicates. See also: Transmission Control
Protocol. Protocol.
[Source: MALAMUD] [Source: MALAMUD]
Structure of Management Information (SMI) Structure of Management Information (SMI)
The rules used to define the objects that can be accessed via a The rules used to define the objects that can be accessed via a
network management protocol. These rules are defined in RFC 1155 network management protocol. These rules are defined in RFC 1155
(STD 17). See also: Management Information Base. (STD 17). The acronym is pronounced "Ess Em Eye." See also:
[Source: RFC1208] Management Information Base. .br [Source: RFC1208]
stub network stub network
A stub network only carries packets to and from local hosts. Even A stub network only carries packets to and from local hosts. Even
if it has paths to more than one other network, it does not carry if it has paths to more than one other network, it does not carry
traffic for other networks. See also: backbone, transit network. traffic for other networks. See also: backbone, transit network.
subnet subnet
A portion of a network, which may be a physically independent A portion of a network, which may be a physically independent
network segment, which shares a network address with other network segment, which shares a network address with other
portions of the network and is distinguished by a subnet number. portions of the network and is distinguished by a subnet number.
skipping to change at page 51, line 14 skipping to change at page 52, line 21
255.255.252.0. See also: IP address, network address, network 255.255.252.0. See also: IP address, network address, network
mask, Classless Inter-domain Routing. mask, Classless Inter-domain Routing.
Switched Multimegabit Data Service (SMDS) Switched Multimegabit Data Service (SMDS)
An emerging high-speed datagram-based public data network service An emerging high-speed datagram-based public data network service
developed by Bellcore and expected to be widely used by telephone developed by Bellcore and expected to be widely used by telephone
companies as the basis for their data networks. See also: companies as the basis for their data networks. See also:
Metropolitan Area Network. Metropolitan Area Network.
[Source: RFC1208] [Source: RFC1208]
Synchronous Digital Hierarchy (SDH)
The European standard for high-speed data communications over
fiber-optic media. The transmission rates range from 155.52Mbps
to 2.5Gbps.
Synchronous Optical NETwork (SONET) Synchronous Optical NETwork (SONET)
SONET is an international standard for high-speed data SONET is an international standard for high-speed data
communications over fiber-optic media. The transmission rates communications over fiber-optic media. The transmission rates
range from 51.84Mbps to 2.5Gbps. range from 51.84Mbps to 2.5Gbps.
Systems Network Architecture (SNA) Systems Network Architecture (SNA)
A proprietary networking architecture used by IBM and IBM- A proprietary networking architecture used by IBM and IBM-
compatible mainframe computers. compatible mainframe computers.
[Source: NNSC] [Source: NNSC]
T1 T1
An AT&T term for a digital carrier facility used to transmit a A term for a digital carrier facility used to transmit a DS-1
DS-1 formatted digital signal at 1.544 megabits per second. formatted digital signal at 1.544 megabits per second.
T3 T3
A term for a digital carrier facility used to transmit a DS-3 A term for a digital carrier facility used to transmit a DS-3
formatted digital signal at 44.746 megabits per second. formatted digital signal at 44.746 megabits per second.
[Source: FYI4] [Source: FYI4]
TAC TAC
See: Terminal Access Controller (TAC) See: Terminal Access Controller (TAC)
talk talk
skipping to change at page 55, line 47 skipping to change at page 57, line 11
uuencode uuencode
A program which reversibly converts a binary file in ASCII. It is A program which reversibly converts a binary file in ASCII. It is
used to send binary files via email, which generally does not used to send binary files via email, which generally does not
allow (or garbles) the transmission of binary information. The allow (or garbles) the transmission of binary information. The
original binary can be restored with uudecode. The encoding original binary can be restored with uudecode. The encoding
process generally creates an ASCII file larger than the original process generally creates an ASCII file larger than the original
binary, so compressing the binary before running uuencode is binary, so compressing the binary before running uuencode is
highly recommended. highly recommended.
Veronica
A Gopher utility which effectively searches Gopher servers based
on a user's list of keywords. The name was chosen to be a "mate"
to another utility named "Archie." It later became an acronym for
Very Easy Rodent Oriented Netwide Index to Computer Archives. See
also: archie, Gopher.
virtual circuit virtual circuit
A network service which provides connection-oriented service A network service which provides connection-oriented service
regardless of the underlying network structure. See also: without necessarily doing circuit-switching. See also:
connection-oriented. connection-oriented.
virus virus
A program which replicates itself on computer systems by A program which replicates itself on computer systems by
incorporating itself into other programs which are shared among incorporating itself into other programs which are shared among
computer systems. See also: Trojan Horse, worm. computer systems. See also: Trojan Horse, worm.
W3 W3
See: World Wide Web See: World Wide Web
WAIS WAIS
See: Wide Area Information Servers See: Wide Area Information Servers
WAN WAN
See: Wide area network See: Wide area network
WebCrawler
A WWW search engine. The aim of the WebCrawler Project is to
provide a high-quality, fast, and free Internet search service.
The WebCrawler may be reached at "http://webcrawler.com/".
[Source: WebCrawler's "WebCrawler Facts"]
WG WG
Working Group See: Working Group
white pages white pages
The Internet supports several databases that contain basic The Internet supports several databases that contain basic
information about users, such as e-mail addresses, telephone information about users, such as e-mail addresses, telephone
numbers, and postal addresses. These databases can be searched to numbers, and postal addresses. These databases can be searched to
get information about particular individuals. Because they serve get information about particular individuals. Because they serve
a function akin to the telephone book, these databases are often a function akin to the telephone book, these databases are often
referred to as "white pages. See also: Knowbot, whois, X.500. referred to as "white pages." See also: Knowbot, netfind, whois,
X.500, InterNIC.
whois whois
An Internet program which allows users to query a database of An Internet program which allows users to query a database of
people and other Internet entities, such as domains, networks, and people and other Internet entities, such as domains, networks, and
hosts. The primary database is kept at the InterNIC. The hosts. The primary database is kept at the InterNIC. The
information stored includes a person's company name, address, information stored includes a person's company name, address,
phone number and email address. The latest version of the phone number and email address. The latest version of the
protocol, WHOIS++, is defined in RFCs 1834 and 1835. See also: protocol, WHOIS++, is defined in RFCs 1834 and 1835. See also:
InterNIC, white pages, Knowbot, X.500. InterNIC, white pages, Knowbot, netfind, X.500.
Wide Area Information Servers (WAIS) Wide Area Information Servers (WAIS)
A distributed information service which offers simple natural A distributed information service which offers simple natural
language input, indexed searching for fast retrieval, and a language input, indexed searching for fast retrieval, and a
"relevance feedback" mechanism which allows the results of initial "relevance feedback" mechanism which allows the results of initial
searches to influence future searches. Public domain searches to influence future searches. Public domain
implementations are available. See also: archie, Gopher, implementations are available. See also: archie, Gopher,
Prospero. Prospero.
Wide Area Network (WAN) Wide Area Network (WAN)
A network, usually constructed with serial lines, which covers a A network, usually constructed with serial lines, which covers a
large geographic area. See also: Local Area Network, Metropolitan large geographic area. See also: Local Area Network, Metropolitan
Area Network. Area Network.
World Wide Web (WWW or W3) Working Group (WG)
A working group, within the IETF, is a group of people who work
under a charter to achieve a certain goal. That goal may be the
creation of an Informational document, the creation of a protocol
specification, or the resolution of problems in the Internet.
Most working groups have a finite lifetime. That is, once a
working group has achieved its goal, it disbands. There is no
official membership for a working group. Unofficially, a working
group member is somebody who is on that working group's mailing
list; however, anyone may attend a working group meeting. See
also: Internet Engineering Task Force, Birds Of a Feather.
World Wide Web (WWW, W3)
A hypertext-based, distributed information system created by A hypertext-based, distributed information system created by
researchers at CERN in Switzerland. Users may create, edit or researchers at CERN in Switzerland. Users may create, edit or
browse hypertext documents. The clients and servers are freely browse hypertext documents. The clients and servers are freely
available. available.
worm worm
A computer program which replicates itself and is self- A computer program which replicates itself and is self-
propagating. Worms, as opposed to viruses, are meant to spawn in propagating. Worms, as opposed to viruses, are meant to spawn in
network environments. Network worms were first defined by Shoch & network environments. Network worms were first defined by Shoch &
Hupp of Xerox in ACM Communications (March 1982). The Internet Hupp of Xerox in ACM Communications (March 1982). The Internet
skipping to change at page 58, line 6 skipping to change at page 59, line 41
in Europe and Canada. in Europe and Canada.
X.500 X.500
The CCITT and ISO standard for electronic directory services. See The CCITT and ISO standard for electronic directory services. See
also: white pages, Knowbot, whois. also: white pages, Knowbot, whois.
XDR XDR
See: eXternal Data Representation See: eXternal Data Representation
Xerox Network System (XNS) Xerox Network System (XNS)
A network developed by Xerox corporation. Implementations exist A protocol suite developed by Xerox Corporation to run on LAN and
for both 4.3BSD derived systems, as well as the Xerox Star WAN networks, where the LANs are typically Ethernet.
computers; however, the protocol is no longer in wide-spread use. Implementations exist for both Xerox's workstations and 4.3BSD,
and 4.3BSD-derived, systems. XNS denotes not only the protocol
stack, but also an architecture of standard programming
interfaces, conventions, and service functions for authentication,
directory, filing, email, and remote procedure call. XNS is also
the name of Xerox's implementation. See also: Ethernet, Berkeley
Software Distribution, Local Area Network, Wide Area Network.
[Source: Jeff Hodges]
XNS XNS
See: Xerox Network System See: Xerox Network System
Yahoo!
Yahoo! is a hierarchical subject-oriented guide for the World Wide
Web and Internet. Yahoo! lists sites and categorizes them into
appropriate subject categories. Yahoo! may be reached at
"http://www.yahoo.com/".
[Source: Yahoo's "What is Yahoo?"]
Yellow Pages (YP) Yellow Pages (YP)
A historic (i.e., no longer in use) service used by UNIX A historic (i.e., no longer in use) service used by UNIX
administrators to manage databases distributed across a network. administrators to manage databases distributed across a network.
YP YP
See: Yellow Pages See: Yellow Pages
zone zone
A logical group of network devices. A logical group of network devices.
skipping to change at page 59, line 41 skipping to change at page 61, line 41
A Beginner's Guide to Global Networking", Addison-Wesley, A Beginner's Guide to Global Networking", Addison-Wesley,
Reading, MA, 1992. Reading, MA, 1992.
NWNET Kochmer, Jonathan, and NorthWestNet, "The Internet Passport: NWNET Kochmer, Jonathan, and NorthWestNet, "The Internet Passport:
NorthWestNets Guide to Our World Online", NorthWestNet, NorthWestNets Guide to Our World Online", NorthWestNet,
Bellevue, WA, 1992. Bellevue, WA, 1992.
RFC1208 Jacobsen, O., D. Lynch, "A Glossary of Networking Terms", RFC RFC1208 Jacobsen, O., D. Lynch, "A Glossary of Networking Terms", RFC
1208, Interop, Inc., March 1991. 1208, Interop, Inc., March 1991.
STD1 Postel, J., "IAB Official Protocol Standards", RFC 1360 (STD STD1 Postel, J., "INTERNET OFFICIAL PROTOCOL STANDARDS", RFC 1920
1), Internet Architecture Board, September 1992. (STD 1), March 1996.
STD2 Reynolds, J., J. Postel, "Assigned Numbers", RFC 1340 (STD STD2 Reynolds, J., J. Postel, "ASSIGNED NUMBERS", RFC 1700 (STD
2), ISI, July 1992. 2), ISI, October 1994.
TAN Tanenbaum, Andrew S., "Computer Networks; 2nd ed.", Prentice TAN Tanenbaum, Andrew S., "Computer Networks; 2nd ed.", Prentice
Hall, Englewood Cliffs, NJ, 1989. Hall, Englewood Cliffs, NJ, 1989.
ZEN Kehoe, Brendan P., "Zen and the Art of the Internet", ZEN Kehoe, Brendan P., "Zen and the Art of the Internet",
February 1992. February 1992.
Security Considerations Security Considerations
While security is not explicitly discussed in this document, some of While security is not explicitly discussed in this document, some of
 End of changes. 72 change blocks. 
128 lines changed or deleted 229 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/