|
Here is a Glossary of all the Internet jargon
10BaseT
A variant of Ethernet which allows stations to be attached via
twisted pair cable. See also: Ethernet, twisted pair.
802.x
The set of IEEE standards for the definition of LAN protocols.
See also: IEEE.
822
See: RFC 822
abstract syntax
A description of a data structure that is independent of machine-
oriented structures and encodings.
[Source: RFC1208]
Abstract Syntax Notation One (ASN.1)
The language used by the OSI protocols for describing abstract
syntax. This language is also used to encode SNMP packets. ASN.1
is defined in ISO documents 8824.2 and 8825.2. See also: Basic
Encoding Rules.
Acceptable Use Policy (AUP)
Many transit networks have policies which restrict the use to
which the network may be put. A well known example is NSFNET's
AUP which does not allow commercial use. Enforcement of AUPs
varies with the network. See also: National Science Foundation.
Access Control List (ACL)
Most network security systems operate by allowing selective use of
services. An Access Control List is the usual means by which
access to, and denial of, services is controlled. It is simply a
list of the services available, each with a list of the hosts
permitted to use the service.
ACK
See: Acknowledgment
acknowledgment (ACK)
A type of message sent to indicate that a block of data arrived at
its destination without error. See also: Negative
Acknowledgement.
[Source: NNSC]
ACL
See: Access Control List
AD
See: Administrative Domain
address
There are three types of addresses in common use within the
Internet. They are email address; IP, internet or Internet
address; and hardware or MAC address. See also: email address, IP
address, internet address, MAC address.
address mask
A bit mask used to identify which bits in an IP address correspond
to the network and subnet portions of the address. This mask is
often referred to as the subnet mask because the network portion
of the address can be determined by the encoding inherent in an IP
address.
address resolution
Conversion of an internet address into the corresponding physical
address.
Address Resolution Protocol (ARP)
Used to dynamically discover the low level physical network
hardware address that corresponds to the high level IP address for
a given host. ARP is limited to physical network systems that
support broadcast packets that can be heard by all hosts on the
network. It is defined in RFC 826. See also: proxy ARP.
Administrative Domain (AD)
A collection of hosts and routers, and the interconnecting
network(s), managed by a single administrative authority.
Advanced Research Projects Agency Network (ARPANET)
A pioneering longhaul network funded by ARPA (now DARPA). It
served as the basis for early networking research, as well as a
central backbone during the development of the Internet. The
ARPANET consisted of individual packet switching computers
interconnected by leased lines. See also: Defense Advanced
Research Projects Agency.
[Source: FYI4]
agent
In the client-server model, the part of the system that performs
information preparation and exchange on behalf of a client or
server application.
[Source: RFC1208]
alias
A name, usually short and easy to remember, that is translated
into another name, usually long and difficult to remember.
American National Standards Institute (ANSI)
This organization is responsible for approving U.S. standards in
many areas, including computers and communications. Standards
approved by this organization are often called ANSI standards
(e.g., ANSI C is the version of the C language approved by ANSI).
ANSI is a member of ISO. See also: International Organization for
Standardization.
[Source: NNSC]
American Standard Code for Information Interchange (ASCII)
A standard character-to-number encoding widely used in the
computer industry. See also: EBCDIC.
anonymous FTP
Anonymous FTP allows a user to retrieve documents, files,
programs, and other archived data from anywhere in the Internet
without having to establish a userid and password. By using the
special userid of "anonymous" the network user will bypass local
security checks and will have access to publicly accessible files
on the remote system. See also: archive site, File Transfer
Protocol.
ANSI
See: American National Standards Institute
API
See: Application Program Interface
Appletalk
A networking protocol developed by Apple Computer for
communication between Apple Computer products and other computers.
This protocol is independent of the network layer on which it is
run. Current implementations exist for Localtalk, a 235Kb/s local
area network; and Ethertalk, a 10Mb/s local area network.
[Source: NNSC]
application
A program that performs a function directly for a user. FTP, mail
and Telnet clients are examples of network applications.
application layer
The top layer of the network protocol stack. The application
layer is concerned with the semantics of work (e.g., formatting
electronic mail messages). How to represent that data and how to
reach the foreign node are issues for lower layers of the network.
[Source: MALAMUD]
Application Program Interface (API)
A set of calling conventions which define how a service is invoked
through a software package.
[Source: RFC1208]
archie
A system to automatically gather, index and serve information on
the Internet. The initial implementation of archie provided an
indexed directory of filenames from all anonymous FTP archives on
the Internet. Later versions provide other collections of
information. See also: archive site, Gopher, Prospero, Wide Area
Information Servers.
archive site
A machine that provides access to a collection of files across the
Internet. An "anonymous FTP archive site", for example, provides
access to this material via the FTP protocol. See also: anonymous
FTP, archie, Gopher, Prospero, Wide Area Information Servers.
ARP
See: Address Resolution Protocol
ARPA
See: Defense Advanced Research Projects Agency
ARPANET
See: Advanced Research Projects Agency Network
AS
See: Autonomous System
ASCII
See: American Standard Code for Information Interchange
ASN.1
See: Abstract Syntax Notation One
assigned numbers
The RFC [STD2] which documents the currently assigned values from
several series of numbers used in network protocol
implementations. This RFC is updated periodically and, in any
case, current information can be obtained from the Internet
Assigned Numbers Authority (IANA). If you are developing a
protocol or application that will require the use of a link,
socket, port, protocol, etc., please contact the IANA to receive a
number assignment. See also: Internet Assigned Numbers Authority,
STD.
[Source: STD2]
Asynchronous Transfer Mode (ATM)
A method for the dynamic allocation of bandwidth using a fixed-
size packet (called a cell). ATM is also known as "fast packet".
ATM
See: Asynchronous Transfer Mode
AUP
See: Acceptable Use Policy
authentication
The verification of the identity of a person or process.
[Source: MALAMUD]
Autonomous System (AS)
A collection of routers under a single administrative authority
using a common Interior Gateway Protocol for routing packets.
backbone
The top level in a hierarchical network. Stub and transit
networks which connect to the same backbone are guaranteed to be
interconnected. See also: stub network, transit network.
bandwidth
Technically, the difference, in Hertz (Hz), between the highest
and lowest frequencies of a transmission channel. However, as
typically used, the amount of data that can be sent through a
given communications circuit.
bang path
A series of machine names used to direct electronic mail from one
user to another, typically by specifying an explicit UUCP path
through which the mail is to be routed. See also: email address,
mail path, UNIX-to-UNIX CoPy.
baseband
A transmission medium through which digital signals are sent
without complicated frequency shifting. In general, only one
communication channel is available at any given time. Ethernet is
an example of a baseband network. See also: broadband, Ethernet.
[Source: NNSC]
Basic Encoding Rules (BER)
Standard rules for encoding data units described in ASN.1.
Sometimes incorrectly lumped under the term ASN.1, which properly
refers only to the abstract syntax description language, not the
encoding technique. See also: Abstract Syntax Notation One.
[Source: NNSC]
BBS
See: Bulletin Board System
BCNU
Be Seein' You
BER
See: Basic Encoding Rules
Berkeley Internet Name Domain (BIND)
Implementation of a DNS server developed and distributed by the
University of California at Berkeley. Many Internet hosts run
BIND, and it is the ancestor of many commercial BIND
implementations.
Berkeley Software Distribution (BSD)
Implementation of the UNIX operating system and its utilities
developed and distributed by the University of California at
Berkeley. "BSD" is usually preceded by the version number of the
distribution, e.g., "4.3 BSD" is version 4.3 of the Berkeley UNIX
distribution. Many Internet hosts run BSD software, and it is the
ancestor of many commercial UNIX implementations.
[Source: NNSC]
BGP
See: Border Gateway Protocol
big-endian
A format for storage or transmission of binary data in which the
most significant bit (or byte) comes first. The term comes from
"Gulliver's Travels" by Jonathan Swift. The Lilliputians, being
very small, had correspondingly small political problems. The
Big-Endian and Little-Endian parties debated over whether soft-
boiled eggs should be opened at the big end or the little end.
See also: little-endian.
[Source: RFC1208]
BIND
See: Berkeley Internet Name Domain
Birds Of a Feather (BOF)
A Birds Of a Feather (flocking together) is an informal discussion
group. It is formed, often ad hoc, to consider a specific issue
and, therefore, has a narrow focus.
Bitnet
An academic computer network that provides interactive electronic
mail and file transfer services, using a store-and-forward
protocol, based on IBM Network Job Entry protocols. Bitnet-II
encapsulates the Bitnet protocol within IP packets and depends on
the Internet to route them.
BOF
See: Birds Of a Feather
BOOTP
The Bootstrap Protocol, described in RFCs 951 and 1084, is used
for booting diskless nodes. See also: Reverse Address Resolution
Protocol.
Border Gateway Protocol (BGP)
The Border Gateway Protocol is an exterior gateway protocol
defined in RFCs 1267 and 1268. It's design is based on experience
gained with EGP, as defined in STD 18, RFC 904, and EGP usage in
the NSFNET Backbone, as described in RFCs 1092 and 1093. See
also: Exterior Gateway Protocol.
bounce
The return of a piece of mail because of an error in its delivery.
[Source: ZEN]
bridge
A device which forwards traffic between network segments based on
datalink layer information. These segments would have a common
network layer address. See also: gateway, router.
broadband
A transmission medium capable of supporting a wide range of
frequencies. It can carry multiple signals by dividing the total
capacity of the medium into multiple, independent bandwidth
channels, where each channel operates only on a specific range of
frequencies. See also: baseband.
broadcast
A special type of multicast packet which all nodes on the network
are always willing to receive. See also: multicast.
broadcast storm
An incorrect packet broadcast onto a network that causes multiple
hosts to respond all at once, typically with equally incorrect
packets which causes the storm to grow exponentially in severity.
brouter
A device which bridges some packets (i.e., forwards based on
datalink layer information) and routes other packets (i.e.,
forwards based on network layer information). The bridge/route
decision is based on configuration information. See also: bridge,
router.
BSD
See: Berkeley Software Distribution
Bulletin Board System (BBS)
A computer, and associated software, which typically provides
electronic messaging services, archives of files, and any other
services or activities of interest to the bulletin board system's
operator. Although BBS's have traditionally been the domain of
hobbyists, an increasing number of BBS's are connected directly to
the Internet, and many BBS's are currently operated by government,
educational, and research institutions. See also: Electronic
Mail, Internet, Usenet.
[Source: NWNET]
Campus Wide Information System (CWIS)
A CWIS makes information and services publicly available on campus
via kiosks, and makes interactive computing available via kiosks,
interactive computing systems and campus networks. Services
routinely include directory information, calendars, bulletin
boards, databases.
CCIRN
See: Coordinating Committee for Intercontinental Research Networks
CCITT
See: Comite Consultatif International de Telegraphique et
Telephonique
CERT
See: Computer Emergency Response Team
checksum
A computed value which is dependent upon the contents of a packet.
This value is sent along with the packet when it is transmitted.
The receiving system computes a new checksum based upon the
received data and compares this value with the one sent with the
packet. If the two values are the same, the receiver has a high
degree of confidence that the data was received correctly.
[Source: NNSC]
circuit switching
A communications paradigm in which a dedicated communication path
is established between two hosts, and on which all packets travel.
The telephone system is an example of a circuit switched network.
See also: connection-oriented, connectionless, packet switching.
client
A computer system or process that requests a service of another
computer system or process. A workstation requesting the contents
of a file from a file server is a client of the file server. See
also: client-server model, server.
[Source: NNSC]
client-server model
A common way to describe the paradigm of many network protocols.
Examples include the name-server/name-resolver relationship in DNS
and the file-server/file-client relationship in NFS. See also:
client, server, Domain Name System, Network File System.
CNI
See: Coalition for Networked Information
Coalition for Networked Information (CNI)
A consortium formed by American Research Libraries, CAUSE, and
EDUCOM to promote the creation of, and access to, information
resources in networked environments in order to enrich scholarship
and enhance intellectual productivity.
Comite Consultatif International de Telegraphique et Telephonique
(CCITT)
This organization is part of the United National International
Telecommunications Union (ITU) and is responsible for making
technical recommendations about telephone and data communications
systems. Every four years CCITT holds plenary sessions where they
adopt new standards; the most recent was in 1992.
[Source: NNSC]
Computer Emergency Response Team (CERT)
The CERT was formed by DARPA in November 1988 in response to the
needs exhibited during the Internet worm incident. The CERT
charter is to work with the Internet community to facilitate its
response to computer security events involving Internet hosts, to
take proactive steps to raise the community's awareness of
computer security issues, and to conduct research targeted at
improving the security of existing systems. CERT products and
services include 24-hour technical assistance for responding to
computer security incidents, product vulnerability assistance,
technical documents, and tutorials. In addition, the team
maintains a number of mailing lists (including one for CERT
Advisories), and provides an anonymous FTP server, at "cert.org",
where security-related documents and tools are archived. The CERT
may be reached by email at "cert@cert.org" and by telephone at
+1-412-268-7090 (24-hour hotline). See also: Defense Advanced
Research Projects Agency, worm.
congestion
Congestion occurs when the offered load exceeds the capacity of a
data communication path.
connection-oriented
The data communication method in which communication proceeds
through three well-defined phases: connection establishment, data
transfer, connection release. TCP is a connection-oriented
protocol. See also: circuit switching, connectionless, packet
switching, Transmission Control Protocol.
connectionless
The data communication method in which communication occurs
between hosts with no previous setup. Packets between two hosts
may take different routes, as each is independent of the other.
UDP is a connectionless protocol. See also: circuit switching,
connection-oriented, packet switching, User Datagram Protocol.
Coordinating Committee for Intercontinental Research Networks (CCIRN)
A committee that includes the United States FNC and its
counterparts in North America and Europe. Co-chaired by the
executive directors of the FNC and the European Association of
Research Networks (RARE), the CCIRN provides a forum for
cooperative planning among the principal North American and
European research networking bodies. See also: Federal Networking
Council, RARE.
[Source: MALAMUD]
core gateway
Historically, one of a set of gateways (routers) operated by the
Internet Network Operations Center at Bolt, Beranek and Newman
(BBN). The core gateway system formed a central part of Internet
routing in that all groups must advertise paths to their networks
from a core gateway.
[Source: MALAMUD]
Corporation for Research and Educational Networking (CREN)
This organization was formed in October 1989, when Bitnet and
CSNET (Computer + Science NETwork) were combined under one
administrative authority. CSNET is no longer operational, but
CREN still runs Bitnet. See also: Bitnet.
[Source: NNSC]
cracker
A cracker is an individual who attempts to access computer systems
without authorization. These individuals are often malicious, as
opposed to hackers, and have many means at their disposal for
breaking into a system. See also: hacker, Computer Emergency
Response Team, Trojan Horse, virus, worm.
CRC
See: cyclic redundancy check
CREN
See: Corporation for Research and Educational Networking
CWIS
See: Campus Wide Information system
Cyberspace
A term coined by William Gibson in his fantasy novel Neuromancer
to describe the "world" of computers, and the society that gathers
around them.
[Source: ZEN]
Cyclic Redundancy Check (CRC)
A number derived from a set of data that will be transmitted. By
recalculating the CRC at the remote end and comparing it to the
value originally transmitted, the receiving node can detect some
types of transmission errors.
[Source: MALAMUD]
| |