RFCs in HTML Format


RFC 1392

Network Working Group                                          G. Malkin
Request for Comments: 1392                                Xylogics, Inc.
FYI: 18                                                 T. LaQuey Parker
                                                                  UTexas
                                                                 Editors
                                                            January 1993


                        Internet Users' Glossary

Table of Contents

   non-letter  . .  2      I . . . . . . . 23      R . . . . . . . 4
   A . . . . . . .  2      J . . . . . . . 29      S . . . . . . . 4
   B . . . . . . .  6      K . . . . . . . 29      T . . . . . . . 4
   C . . . . . . .  9      L . . . . . . . 29      U . . . . . . . 4
   D . . . . . . . 12      M . . . . . . . 30      V . . . . . . . 4
   E . . . . . . . 16      N . . . . . . . 33      W . . . . . . . 4
   F . . . . . . . 18      O . . . . . . . 36      X . . . . . . . 5
   G . . . . . . . 20      P . . . . . . . 37      Y . . . . . . . 5
   H . . . . . . . 21      Q . . . . . . . 40      Z . . . . . . . 5

   References  . . . . . . . . . . . . . . . . . . . . . . . . . . 52
   Security Considerations . . . . . . . . . . . . . . . . . . . . 53
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . 53



User Glossary Working Group                                     [Page 1]

RFC 1392 Internet Glossary January 1993 Glossary 10BaseT A variant of Ethernet which allows stations to be attached via twisted pair cable. See also: Ethernet, twisted pair. 802.x The set of IEEE standards for the definition of LAN protocols. See also: IEEE. 822 See: RFC 822 :-) This odd symbol is one of the ways a person can portray "mood" in the very flat medium of computers--by using "smiley faces". This is "metacommunication", and there are literally hundreds of such symbols, from the obvious to the obscure. This particular example expresses "happiness". Don't see it? Tilt your head to the left 90 degrees. Smiles are also used to denote sarcasm. [Source: ZEN] abstract syntax A description of a data structure that is independent of machine- oriented structures and encodings. [Source: RFC1208] Abstract Syntax Notation One (ASN.1) The language used by the OSI protocols for describing abstract syntax. This language is also used to encode SNMP packets. ASN.1 is defined in ISO documents 8824.2 and 8825.2. See also: Basic Encoding Rules. Acceptable Use Policy (AUP) Many transit networks have policies which restrict the use to which the network may be put. A well known example is NSFNET's AUP which does not allow commercial use. Enforcement of AUPs varies with the network. See also: National Science Foundation. Access Control List (ACL) Most network security systems operate by allowing selective use of services. An Access Control List is the usual means by which access to, and denial of, services is controlled. It is simply a list of the services available, each with a list of the hosts permitted to use the service. ACK See: Acknowledgment User Glossary Working Group [Page 2]
RFC 1392 Internet Glossary January 1993 acknowledgment (ACK) A type of message sent to indicate that a block of data arrived at its destination without error. See also: Negative Acknowledgement. [Source: NNSC] ACL See: Access Control List AD See: Administrative Domain address There are three types of addresses in common use within the Internet. They are email address; IP, internet or Internet address; and hardware or MAC address. See also: email address, IP address, internet address, MAC address. address mask A bit mask used to identify which bits in an IP address correspond to the network and subnet portions of the address. This mask is often referred to as the subnet mask because the network portion of the address can be determined by the encoding inherent in an IP address. address resolution Conversion of an internet address into the corresponding physical address. Address Resolution Protocol (ARP) Used to dynamically discover the low level physical network hardware address that corresponds to the high level IP address for a given host. ARP is limited to physical network systems that support broadcast packets that can be heard by all hosts on the network. It is defined in RFC 826. See also: proxy ARP. Administrative Domain (AD) A collection of hosts and routers, and the interconnecting network(s), managed by a single administrative authority. Advanced Research Projects Agency Network (ARPANET) A pioneering longhaul network funded by ARPA (now DARPA). It served as the basis for early networking research, as well as a central backbone during the development of the Internet. The ARPANET consisted of individual packet switching computers interconnected by leased lines. See also: Defense Advanced Research Projects Agency. [Source: FYI4] User Glossary Working Group [Page 3]
RFC 1392 Internet Glossary January 1993 agent In the client-server model, the part of the system that performs information preparation and exchange on behalf of a client or server application. [Source: RFC1208] alias A name, usually short and easy to remember, that is translated into another name, usually long and difficult to remember. American National Standards Institute (ANSI) This organization is responsible for approving U.S. standards in many areas, including computers and communications. Standards approved by this organization are often called ANSI standards (e.g., ANSI C is the version of the C language approved by ANSI). ANSI is a member of ISO. See also: International Organization for Standardization. [Source: NNSC] American Standard Code for Information Interchange (ASCII) A standard character-to-number encoding widely used in the computer industry. See also: EBCDIC. anonymous FTP Anonymous FTP allows a user to retrieve documents, files, programs, and other archived data from anywhere in the Internet without having to establish a userid and password. By using the special userid of "anonymous" the network user will bypass local security checks and will have access to publicly accessible files on the remote system. See also: archive site, File Transfer Protocol. ANSI See: American National Standards Institute API See: Application Program Interface Appletalk A networking protocol developed by Apple Computer for communication between Apple Computer products and other computers. This protocol is independent of the network layer on which it is run. Current implementations exist for Localtalk, a 235Kb/s local area network; and Ethertalk, a 10Mb/s local area network. [Source: NNSC] application A program that performs a function directly for a user. FTP, mail User Glossary Working Group [Page 4]
RFC 1392 Internet Glossary January 1993 and Telnet clients are examples of network applications. application layer The top layer of the network protocol stack. The application layer is concerned with the semantics of work (e.g., formatting electronic mail messages). How to represent that data and how to reach the foreign node are issues for lower layers of the network. [Source: MALAMUD] Application Program Interface (API) A set of calling conventions which define how a service is invoked through a software package. [Source: RFC1208] archie A system to automatically gather, index and serve information on the Internet. The initial implementation of archie provided an indexed directory of filenames from all anonymous FTP archives on the Internet. Later versions provide other collections of information. See also: archive site, Gopher, Prospero, Wide Area Information Servers. archive site A machine that provides access to a collection of files across the Internet. An "anonymous FTP archive site", for example, provides access to this material via the FTP protocol. See also: anonymous FTP, archie, Gopher, Prospero, Wide Area Information Servers. ARP See: Address Resolution Protocol ARPA See: Defense Advanced Research Projects Agency ARPANET See: Advanced Research Projects Agency Network AS See: Autonomous System ASCII See: American Standard Code for Information Interchange ASN.1 See: Abstract Syntax Notation One assigned numbers The RFC [STD2] which documents the currently assigned values from User Glossary Working Group [Page 5]
RFC 1392 Internet Glossary January 1993 several series of numbers used in network protocol implementations. This RFC is updated periodically and, in any case, current information can be obtained from the Internet Assigned Numbers Authority (IANA). If you are developing a protocol or application that will require the use of a link, socket, port, protocol, etc., please contact the IANA to receive a number assignment. See also: Internet Assigned Numbers Authority, STD. [Source: STD2] Asynchronous Transfer Mode (ATM) A method for the dynamic allocation of bandwidth using a fixed- size packet (called a cell). ATM is also known as "fast packet". ATM See: Asynchronous Transfer Mode AUP See: Acceptable Use Policy authentication The verification of the identity of a person or process. [Source: MALAMUD] Autonomous System (AS) A collection of routers under a single administrative authority using a common Interior Gateway Protocol for routing packets. backbone The top level in a hierarchical network. Stub and transit networks which connect to the same backbone are guaranteed to be interconnected. See also: stub network, transit network. bandwidth Technically, the difference, in Hertz (Hz), between the highest and lowest frequencies of a transmission channel. However, as typically used, the amount of data that can be sent through a given communications circuit. bang path A series of machine names used to direct electronic mail from one user to another, typically by specifying an explicit UUCP path through which the mail is to be routed. See also: email address, mail path, UNIX-to-UNIX CoPy. baseband A transmission medium through which digital signals are sent without complicated frequency shifting. In general, only one User Glossary Working Group [Page 6]
RFC 1392 Internet Glossary January 1993 communication channel is available at any given time. Ethernet is an example of a baseband network. See also: broadband, Ethernet. [Source: NNSC] Basic Encoding Rules (BER) Standard rules for encoding data units described in ASN.1. Sometimes incorrectly lumped under the term ASN.1, which properly refers only to the abstract syntax description language, not the encoding technique. See also: Abstract Syntax Notation One. [Source: NNSC] BBS See: Bulletin Board System BCNU Be Seein' You BER See: Basic Encoding Rules Berkeley Internet Name Domain (BIND) Implementation of a DNS server developed and distributed by the University of California at Berkeley. Many Internet hosts run BIND, and it is the ancestor of many commercial BIND implementations. Berkeley Software Distribution (BSD) Implementation of the UNIX operating system and its utilities developed and distributed by the University of California at Berkeley. "BSD" is usually preceded by the version number of the distribution, e.g., "4.3 BSD" is version 4.3 of the Berkeley UNIX distribution. Many Internet hosts run BSD software, and it is the ancestor of many commercial UNIX implementations. [Source: NNSC] BGP See: Border Gateway Protocol big-endian A format for storage or transmission of binary data in which the most significant bit (or byte) comes first. The term comes from "Gulliver's Travels" by Jonathan Swift. The Lilliputians, being very small, had correspondingly small political problems. The Big-Endian and Little-Endian parties debated over whether soft- boiled eggs should be opened at the big end or the little end. See also: little-endian. [Source: RFC1208] User Glossary Working Group [Page 7]
RFC 1392 Internet Glossary January 1993 binary 1.1001e+07 BIND See: Berkeley Internet Name Domain Birds Of a Feather (BOF) A Birds Of a Feather (flocking together) is an informal discussion group. It is formed, often ad hoc, to consider a specific issue and, therefore, has a narrow focus. Bitnet An academic computer network that provides interactive electronic mail and file transfer services, using a store-and-forward protocol, based on IBM Network Job Entry protocols. Bitnet-II encapsulates the Bitnet protocol within IP packets and depends on the Internet to route them. BOF See: Birds Of a Feather BOOTP The Bootstrap Protocol, described in RFCs 951 and 1084, is used for booting diskless nodes. See also: Reverse Address Resolution Protocol. Border Gateway Protocol (BGP) The Border Gateway Protocol is an exterior gateway protocol defined in RFCs 1267 and 1268. It's design is based on experience gained with EGP, as defined in STD 18, RFC 904, and EGP usage in the NSFNET Backbone, as described in RFCs 1092 and 1093. See also: Exterior Gateway Protocol. bounce The return of a piece of mail because of an error in its delivery. [Source: ZEN] bridge A device which forwards traffic between network segments based on datalink layer information. These segments would have a common network layer address. See also: gateway, router. broadband A transmission medium capable of supporting a wide range of frequencies. It can carry multiple signals by dividing the total capacity of the medium into multiple, independent bandwidth channels, where each channel operates only on a specific range of frequencies. See also: baseband. User Glossary Working Group [Page 8]
RFC 1392 Internet Glossary January 1993 broadcast A special type of multicast packet which all nodes on the network are always willing to receive. See also: multicast. broadcast storm An incorrect packet broadcast onto a network that causes multiple hosts to respond all at once, typically with equally incorrect packets which causes the storm to grow exponentially in severity. brouter A device which bridges some packets (i.e., forwards based on datalink layer information) and routes other packets (i.e., forwards based on network layer information). The bridge/route decision is based on configuration information. See also: bridge, router. BSD See: Berkeley Software Distribution BTW By The Way Bulletin Board System (BBS) A computer, and associated software, which typically provides electronic messaging services, archives of files, and any other services or activities of interest to the bulletin board system's operator. Although BBS's have traditionally been the domain of hobbyists, an increasing number of BBS's are connected directly to the Internet, and many BBS's are currently operated by government, educational, and research institutions. See also: Electronic Mail, Internet, Usenet. [Source: NWNET] Campus Wide Information System (CWIS) A CWIS makes information and services publicly available on campus via kiosks, and makes interactive computing available via kiosks, interactive computing systems and campus networks. Services routinely include directory information, calendars, bulletin boards, databases. CCIRN See: Coordinating Committee for Intercontinental Research Networks CCITT See: Comite Consultatif International de Telegraphique et Telephonique User Glossary Working Group [Page 9]
RFC 1392 Internet Glossary January 1993 CERT See: Computer Emergency Response Team checksum A computed value which is dependent upon the contents of a packet. This value is sent along with the packet when it is transmitted. The receiving system computes a new checksum based upon the received data and compares this value with the one sent with the packet. If the two values are the same, the receiver has a high degree of confidence that the data was received correctly. [Source: NNSC] circuit switching A communications paradigm in which a dedicated communication path is established between two hosts, and on which all packets travel. The telephone system is an example of a circuit switched network. See also: connection-oriented, connectionless, packet switching. client A computer system or process that requests a service of another computer system or process. A workstation requesting the contents of a file from a file server is a client of the file server. See also: client-server model, server. [Source: NNSC] client-server model A common way to describe the paradigm of many network protocols. Examples include the name-server/name-resolver relationship in DNS and the file-server/file-client relationship in NFS. See also: client, server, Domain Name System, Network File System. CNI See: Coalition for Networked Information Coalition for Networked Information (CNI) A consortium formed by American Research Libraries, CAUSE, and EDUCOM to promote the creation of, and access to, information resources in networked environments in order to enrich scholarship and enhance intellectual productivity. Comite Consultatif International de Telegraphique et Telephonique (CCITT) This organization is part of the United National International Telecommunications Union (ITU) and is responsible for making technical recommendations about telephone and data communications systems. Every four years CCITT holds plenary sessions where they adopt new standards; the most recent was in 1992. [Source: NNSC] User Glossary Working Group [Page 10]
RFC 1392 Internet Glossary January 1993 Computer Emergency Response Team (CERT) The CERT was formed by DARPA in November 1988 in response to the needs exhibited during the Internet worm incident. The CERT charter is to work with the Internet community to facilitate its response to computer security events involving Internet hosts, to take proactive steps to raise the community's awareness of computer security issues, and to conduct research targeted at improving the security of existing systems. CERT products and services include 24-hour technical assistance for responding to computer security incidents, product vulnerability assistance, technical documents, and tutorials. In addition, the team maintains a number of mailing lists (including one for CERT Advisories), and provides an anonymous FTP server, at "cert.org", where security-related documents and tools are archived. The CERT may be reached by email at "cert@cert.org" and by telephone at +1-412-268-7090 (24-hour hotline). See also: Defense Advanced Research Projects Agency, worm. congestion Congestion occurs when the offered load exceeds the capacity of a data communication path. connection-oriented The data communication method in which communication proceeds through three well-defined phases: connection establishment, data transfer, connection release. TCP is a connection-oriented protocol. See also: circuit switching, connectionless, packet switching, Transmission Control Protocol. connectionless The data communication method in which communication occurs between hosts with no previous setup. Packets between two hosts may take different routes, as each is independent of the other. UDP is a connectionless protocol. See also: circuit switching, connection-oriented, packet switching, User Datagram Protocol. Coordinating Committee for Intercontinental Research Networks (CCIRN) A committee that includes the United States FNC and its counterparts in North America and Europe. Co-chaired by the executive directors of the FNC and the European Association of Research Networks (RARE), the CCIRN provides a forum for cooperative planning among the principal North American and European research networking bodies. See also: Federal Networking Council, RARE. [Source: MALAMUD] core gateway Historically, one of a set of gateways (routers) operated by the User Glossary Working Group [Page 11]
RFC 1392 Internet Glossary January 1993 Internet Network Operations Center at Bolt, Beranek and Newman (BBN). The core gateway system formed a central part of Internet routing in that all groups must advertise paths to their networks from a core gateway. [Source: MALAMUD] Corporation for Research and Educational Networking (CREN) This organization was formed in October 1989, when Bitnet and CSNET (Computer + Science NETwork) were combined under one administrative authority. CSNET is no longer operational, but CREN still runs Bitnet. See also: Bitnet. [Source: NNSC] cracker A cracker is an individual who attempts to access computer systems without authorization. These individuals are often malicious, as opposed to hackers, and have many means at their disposal for breaking into a system. See also: hacker, Computer Emergency Response Team, Trojan Horse, virus, worm. CRC See: cyclic redundancy check CREN See: Corporation for Research and Educational Networking CWIS See: Campus Wide Information system Cyberspace A term coined by William Gibson in his fantasy novel Neuromancer to describe the "world" of computers, and the society that gathers around them. [Source: ZEN] Cyclic Redundancy Check (CRC) A number derived from a set of data that will be transmitted. By recalculating the CRC at the remote end and comparing it to the value originally transmitted, the receiving node can detect some types of transmission errors. [Source: MALAMUD] DARPA See: Defense Advanced Research Projects Agency Data Encryption Key (DEK) Used for the encryption of message text and for the computation of message integrity checks (signatures). See also: encryption. User Glossary Working Group [Page 12]
RFC 1392 Internet Glossary January 1993 Data Encryption Standard (DES) A popular, standard encryption scheme. See also: encryption. datagram A self-contained, independent entity of data carrying sufficient information to be routed from the source to the destination computer without reliance on earlier exchanges between this source and destination computer and the transporting network. See also: frame, packet. [Source: J. Postel] DCA See: Defense Information Systems Agency DCE Data Circuit-terminating Equipment DCE See: Distributed Computing Environment DDN See: Defense Data Network DDN NIC See: Defense Data Network Network Information Center DECnet A proprietary network protocol designed by Digital Equipment Corporation. The functionality of each Phase of the implementation, such as Phase IV and Phase V, is different. default route A routing table entry which is used to direct packets addressed to networks not explicitly listed in the routing table. [Source: MALAMUD] Defense Advanced Research Projects Agency (DARPA) An agency of the U.S. Department of Defense responsible for the development of new technology for use by the military. DARPA (formerly known as ARPA) was responsible for funding much of the development of the Internet we know today, including the Berkeley version of Unix and TCP/IP. [Source: NNSC] Defense Data Network (DDN) A global communications network serving the US Department of Defense composed of MILNET, other portions of the Internet, and classified networks which are not part of the Internet. The DDN User Glossary Working Group [Page 13]
RFC 1392 Internet Glossary January 1993 is used to connect military installations and is managed by the Defense Information Systems Agency. See also: Defense Information Systems Agency. Defense Data Network Network Information Center (DDN NIC) Often called "The NIC", the DDN NIC's primary responsibility is the assignment of Internet network addresses and Autonomous System numbers, the administration of the root domain, and providing information and support services to the DDN. It is also a primary repository for RFCs. See also: Autonomous System, network address, Internet Registry, Network Information Center, Request For Comments. Defense Information Systems Agency (DISA) Formerly called the Defense Communications Agency (DCA), this is the government agency responsible for managing the DDN portion of the Internet, including the MILNET. Currently, DISA administers the DDN, and supports the user assistance services of the DDN NIC. See also: Defense Data Network. DEK See: Data Encryption Key DES See: Data Encryption Standard dialup A temporary, as opposed to dedicated, connection between machines established over a standard phone line. Directory Access Protocol X.500 protocol used for communication between a Directory User Agent and a Directory System Agent. [Source: MALAMUD] Directory System Agent (DSA) The software that provides the X.500 Directory Service for a portion of the directory information base. Generally, each DSA is responsible for the directory information for a single organization or organizational unit. [Source: RFC1208] Directory User Agent (DUA) The software that accesses the X.500 Directory Service on behalf of the directory user. The directory user may be a person or another software element. [Source: RFC1208] User Glossary Working Group [Page 14]
RFC 1392 Internet Glossary January 1993 DISA See: Defense Information Systems Agency Distributed Computing Environment (DCE) An architecture of standard programming interfaces, conventions, and server functionalities (e.g., naming, distributed file system, remote procedure call) for distributing applications transparently across networks of heterogeneous computers. Promoted and controlled by the Open Software Foundation (OSF), a consortium led by Digital, IBM and Hewlett Packard. [Source: RFC1208] distributed database A collection of several different data repositories that looks like a single database to the user. A prime example in the Internet is the Domain Name System. DIX Ethernet See: Ethernet DNS See: Domain Name System domain "Domain" is a heavily overused term in the Internet. It can be used in the Administrative Domain context, or the Domain Name context. See also: Administrative Domain, Domain Name System. Domain Name System (DNS) The DNS is a general purpose distributed, replicated, data query service. The principal use is the lookup of host IP addresses based on host names. The style of host names now used in the Internet is called "domain name", because they are the style of names used to look up anything in the DNS. Some important domains are: .COM (commercial), .EDU (educational), .NET (network operations), .GOV (U.S. government), and .MIL (U.S. military). Most countries also have a domain. For example, .US (United States), .UK (United Kingdom), .AU (Australia). It is defined in STD 13, RFCs 1034 and 1035. See also: Fully Qualified Domain Name. dot address (dotted decimal notation) Dot address refers to the common notation for IP addresses of the form A.B.C.D; where each letter represents, in decimal, one byte of a four byte IP address. See also: IP address. [Source: FYI4] User Glossary Working Group [Page 15]
RFC 1392 Internet Glossary January 1993 DS1 A framing specification for T-1 synchronous lines. See also: T1 DS3 A framing specification for T-3 synchronous lines. See also: T3 DSA See: Directory System Agent DTE Data Terminal Equipment DUA See: Directory User Agent dynamic adaptive routing Automatic rerouting of traffic based on a sensing and analysis of current actual network conditions. NOTE: this does not include cases of routing decisions taken on predefined information. [Source: J. Postel] EARN See: European Academic and Research Network EBCDIC See: Extended Binary Coded Decimal Interchange Code Ebone A pan-European backbone service. EFF See: Electronic Frontier Foundation EFLA See: Extended Four Letter Acronym EGP See: Exterior Gateway Protocol Electronic Frontier Foundation (EFF) A foundation established to address social and legal issues arising from the impact on society of the increasingly pervasive use of computers as a means of communication and information distribution. Electronic Mail (email) A system whereby a computer user can exchange messages with other computer users (or groups of users) via a communications network. User Glossary Working Group [Page 16]
RFC 1392 Internet Glossary January 1993 Electronic mail is one of the most popular uses of the Internet. [Source: NNSC] email See: Electronic mail email address The domain-based or UUCP address that is used to send electronic mail to a specified destination. For example an editor's address is "gmalkin@xylogics.com". See also: bang path, mail path, UNIX- to-UNIX CoPy. [Source: ZEN] encapsulation The technique used by layered protocols in which a layer adds header information to the protocol data unit (PDU) from the layer above. As an example, in Internet terminology, a packet would contain a header from the physical layer, followed by a header from the network layer (IP), followed by a header from the transport layer (TCP), followed by the application protocol data. [Source: RFC1208] encryption Encryption is the manipulation of a packet's data in order to prevent any but the intended recipient from reading that data. There are many types of data encryption, and they are the basis of network security. See also: Data Encryption Standard. Ethernet A 10-Mb/s standard for LANs, initially developed by Xerox, and later refined by Digital, Intel and Xerox (DIX). All hosts are connected to a coaxial cable where they contend for network access using a Carrier Sense Multiple Access with Collision Detection (CSMA/CD) paradigm. See also: 802.x, Local Area Network, token ring. Ethernet meltdown An event that causes saturation, or near saturation, on an Ethernet. It usually results from illegal or misrouted packets and typically lasts only a short time. [Source: COMER] European Academic and Research Network (EARN) A network connecting European academic and research institutions with electronic mail and file transfer services using the Bitnet protocol. See also: Bitnet User Glossary Working Group [Page 17]
RFC 1392 Internet Glossary January 1993 Extended Binary Coded Decimal Interchange Code (EBCDIC) A standard character-to-number encoding used primarily by IBM computer systems. See also: ASCII. Extended Four Letter Acronym (EFLA) A recognition of the fact that there are far too many TLAs. See also: Three Letter Acronym. [Source: K. Morgan] Exterior Gateway Protocol (EGP) A protocol which distributes routing information to the routers which connect autonomous systems. The term "gateway" is historical, as "router" is currently the preferred term. There is also a routing protocol called EGP defined in STD 18, RFC 904. See also: Autonomous System, Border Gateway Protocol, Interior Gateway Protocol. eXternal Data Representation (XDR) A standard for machine independent data structures developed by Sun Microsystems and defined in RFC 1014. It is similar to ASN.1. See also: Abstract Syntax Notation One. [Source: RFC1208] FARNET A non-profit corporation, established in 1987, whose mission is to advance the use of computer networks to improve research and education. FAQ Frequently Asked Question FDDI See: Fiber Distributed Data Interface Federal Information Exchange (FIX) One of the connection points between the American governmental internets and the Internet. [Source: SURA] Federal Networking Council (FNC) The coordinating group of representatives from those federal agencies involved in the development and use of federal networking, especially those networks using TCP/IP and the Internet. Current members include representatives from DOD, DOE, DARPA, NSF, NASA, and HHS. See also: Defense Advanced Research Projects Agency, National Science Foundation. User Glossary Working Group [Page 18]
RFC 1392 Internet Glossary January 1993 Fiber Distributed Data Interface (FDDI) A high-speed (100Mb/s) LAN standard. The underlying medium is fiber optics, and the topology is a dual-attached, counter- rotating token ring. See also: Local Area Network, token ring. [Source: RFC1208] file transfer The copying of a file from one computer to another over a computer network. See also: File Transfer Protocol, Kermit. File Transfer Protocol (FTP) A protocol which allows a user on one host to access, and transfer files to and from, another host over a network. Also, FTP is usually the name of the program the user invokes to execute the protocol. It is defined in STD 9, RFC 959. See also: anonymous FTP. finger A program that displays information about a particular user, or all users, logged on the local system or on a remote system. It typically shows full name, last login time, idle time, terminal line, and terminal location (where applicable). It may also display plan and project files left by the user. FIX See: Federal Information Exchange flame A strong opinion and/or criticism of something, usually as a frank inflammatory statement, in an electronic mail message. It is common to precede a flame with an indication of pending fire (i.e., FLAME ON!). Flame Wars occur when people start flaming other people for flaming when they shouldn't have. See also: Electronic Mail FNC See: Federal Networking Council For Your Information (FYI) A subseries of RFCs that are not technical standards or descriptions of protocols. FYIs convey general information about topics related to TCP/IP or the Internet. See also: Request For Comments, STD. FQDN See: Fully Qualified Domain Name User Glossary Working Group [Page 19]
RFC 1392 Internet Glossary January 1993 fragment A piece of a packet. When a router is forwarding an IP packet to a network that has a maximum packet size smaller than the packet size, it is forced to break up that packet into multiple fragments. These fragments will be reassembled by the IP layer at the destination host. fragmentation The IP process in which a packet is broken into smaller pieces to fit the requirements of a physical network over which the packet must pass. See also: reassembly. frame A frame is a datalink layer "packet" which contains the header and trailer information required by the physical medium. That is, network layer packets are encapsulated to become frames. See also: datagram, encapsulation, packet. freenet Community-based bulletin board system with email, information services, interactive communications, and conferencing. Freenets are funded and operated by individuals and volunteers -- in one sense, like public television. They are part of the National Public Telecomputing Network (NPTN), an organization based in Cleveland, Ohio, devoted to making computer telecommunication and networking services as freely available as public libraries. [Source: LAQUEY] FTP See: File Transfer Protocol Fully Qualified Domain Name (FQDN) The FQDN is the full name of a system, rather than just its hostname. For example, "venera" is a hostname and "venera.isi.edu" is an FQDN. See also: hostname, Domain Name System. FYI See: For Your Information gross A dozen dozen (144). gated Gatedaemon. A program which supports multiple routing protocols and protocol families. It may be used for routing, and makes an effective platform for routing protocol research. The software is freely available by anonymous FTP from "gated.cornell.edu". User Glossary Working Group [Page 20]
RFC 1392 Internet Glossary January 1993 Pronounced "gate-dee". See also: Exterior Gateway Protocol, Open Shortest Path First..., Routing Information Protocol, routed. gateway The term "router" is now used in place of the original definition of "gateway". Currently, a gateway is a communications device/program which passes data between networks having similar functions but dissimilar implementations. This should not be confused with a protocol converter. By this definition, a router is a layer 3 (network layer) gateway, and a mail gateway is a layer 7 (application layer) gateway. See also: mail gateway, router, protocol converter. Gopher A distributed information service that makes available hierarchical collections of information across the Internet. Gopher uses a simple protocol that allows a single Gopher client to access information from any accessible Gopher server, providing the user with a single "Gopher space" of information. Public domain versions of the client and server are available. See also: archie, archive site, Prospero, Wide Area Information Servers. GOSIP See: Government OSI Profile Government OSI Profile A subset of OSI standards specific to U.S. Government procurements, designed to maximize interoperability in areas where plain OSI standards are ambiguous or allow excessive options. [Source: BIG-LAN] hacker A person who delights in having an intimate understanding of the internal workings of a system, computers and computer networks in particular. The term is often misused in a pejorative context, where "cracker" would be the correct term. See also: cracker. header The portion of a packet, preceding the actual data, containing source and destination addresses, and error checking and other fields. A header is also the part of an electronic mail message that precedes the body of a message and contains, among other things, the message originator, date and time. See also: Electronic Mail, packet. heterogeneous network A network running multiple network layer protocols. See also: DECnet, IP, IPX, XNS. User Glossary Working Group [Page 21]
RFC 1392 Internet Glossary January 1993
RFC 1392 Internet Glossary January 1993 SMDS See: Switched Multimegabit Data Service SMI See: Structure of Management Information SMTP See: Simple Mail Transfer Protocol SNA See: Systems Network Architecture snail mail A pejorative term referring to the U.S. postal service. SNMP See: Simple Network Management Protocol STD A subseries of RFCs that specify Internet standards. The official list of Internet standards is in STD 1. See also: For Your Information, Request For Comments. stream-oriented A type of transport service that allows its client to send data in a continuous stream. The transport service will guarantee that all data will be delivered to the other end in the same order as sent and without duplicates. See also: Transmission Control Protocol. [Source: MALAMUD] Structure of Management Information (SMI) The rules used to define the objects that can be accessed via a network management protocol. This protocol is defined in STD 16, RFC 1155. See also: Management Information Base. [Source: RFC1208] stub network A stub network only carries packets to and from local hosts. Even if it has paths to more than one other network, it does not carry traffic for other networks. See also: backbone, transit network. subnet A portion of a network, which may be a physically independent network segment, which shares a network address with other portions of the network and is distinguished by a subnet number. A subnet is to a network what a network is to an internet. See also: internet, network. User Glossary Working Group [Page 44]
RFC 1392 Internet Glossary January 1993 [Source: FYI4] subnet address The subnet portion of an IP address. In a subnetted network, the host portion of an IP address is split into a subnet portion and a host portion using an address (subnet) mask. See also: address mask, IP address, network address, host address. subnet mask See: address mask subnet number See: subnet address Switched Multimegabit Data Service (SMDS) An emerging high-speed datagram-based public data network service developed by Bellcore and expected to be widely used by telephone companies as the basis for their data networks. See also: Metropolitan Area Network. [Source: RFC1208] Systems Network Architecture (SNA) A proprietary networking architecture used by IBM and IBM- compatible mainframe computers. [Source: NNSC] T1 An AT&T term for a digital carrier facility used to transmit a DS-1 formatted digital signal at 1.544 megabits per second. T3 A term for a digital carrier facility used to transmit a DS-3 formatted digital signal at 44.746 megabits per second. [Source: FYI4] TAC See: Terminal Access Controller (TAC) talk A protocol which allows two people on remote computers to communicate in a real-time fashion. See also: Internet Relay Chat. TCP See: Transmission Control Protocol TCP/IP Protocol Suite Transmission Control Protocol over Internet Protocol. This is a User Glossary Working Group [Page 45]
RFC 1392 Internet Glossary January 1993 common shorthand which refers to the suite of transport and application protocols which runs over IP. See also: IP, ICMP, TCP, UDP, FTP, Telnet, SMTP, SNMP. TELENET A public packet switched network using the CCITT X.25 protocols. It should not be confused with Telnet. Telnet Telnet is the Internet standard protocol for remote terminal connection service. It is defined in STD 8, RFC 854 and extended with options by many other RFCs. Terminal Access Controller (TAC) A device which connects terminals to the Internet, usually using dialup modem connections and the TACACS protocol. terminal emulator A program that allows a computer to emulate a terminal. The workstation thus appears as a terminal to the remote host. [Source: MALAMUD] terminal server A device which connects many terminals to a LAN through one network connection. A terminal server can also connect many network users to its asynchronous ports for dial-out capabilities and printer access. See also: Local Area Network. Three Letter Acronym (TLA) A tribute to the use of acronyms in the computer field. See also: Extended Four Letter Acronym. Time to Live (TTL) A field in the IP header which indicates how long this packet should be allowed to survive before being discarded. It is primarily used as a hop count. See also: Internet Protocol. [Source: MALAMUD] TLA See: Three Letter Acronym TN3270 A variant of the Telnet program that allows one to attach to IBM mainframes and use the mainframe as if you had a 3270 or similar terminal. [Source: BIG-LAN] User Glossary Working Group [Page 46]
RFC 1392 Internet Glossary January 1993 token ring A token ring is a type of LAN with nodes wired into a ring. Each node constantly passes a control message (token) on to the next; whichever node has the token can send a message. Often, "Token Ring" is used to refer to the IEEE 802.5 token ring standard, which is the most common type of token ring. See also: 802.x, Local Area Network. topology A network topology shows the computers and the links between them. A network layer must stay abreast of the current network topology to be able to route packets to their final destination. [Source: MALAMUD] transceiver Transmitter-receiver. The physical device that connects a host interface to a local area network, such as Ethernet. Ethernet transceivers contain electronics that apply signals to the cable and sense collisions. [Source: RFC1208] transit network A transit network passes traffic between networks in addition to carrying traffic for its own hosts. It must have paths to at least two other networks. See also: backbone, stub network. Transmission Control Protocol (TCP) An Internet Standard transport layer protocol defined in STD 7, RFC 793. It is connection-oriented and stream-oriented, as opposed to UDP. See also: connection-oriented, stream-oriented, User Datagram Protocol. Trojan Horse A computer program which carries within itself a means to allow the creator of the program access to the system using it. See also: virus, worm. See RFC 1135. TTFN Ta-Ta For Now TTL See: Time to Live tunnelling Tunnelling refers to encapsulation of protocol A within protocol B, such that A treats B as though it were a datalink layer. Tunnelling is used to get data between administrative domains which use a protocol that is not supported by the internet User Glossary Working Group [Page 47]
RFC 1392 Internet Glossary January 1993 connecting those domains. See also: Administrative Domain. twisted pair A type of cable in which pairs of conductors are twisted together to produce certain electrical properties. UDP See: User Datagram Protocol Universal Time Coordinated (UTC) This is Greenwich Mean Time. [Source: MALAMUD] UNIX-to-UNIX CoPy (UUCP) This was initially a program run under the UNIX operating system that allowed one UNIX system to send files to another UNIX system via dial-up phone lines. Today, the term is more commonly used to describe the large international network which uses the UUCP protocol to pass news and electronic mail. See also: Electronic Mail, Usenet. urban legend A story, which may have started with a grain of truth, that has been embroidered and retold until it has passed into the realm of myth. It is an interesting phenonmenon that these stories get spread so far, so fast and so often. Urban legends never die, they just end up on the Internet! Some legends that periodically make their rounds include "The Infamous Modem Tax," "Craig Shergold/Brain Tumor/Get Well Cards," and "The $250 Cookie Recipe". [Source: LAQUEY] Usenet A collection of thousands of topically named newsgroups, the computers which run the protocols, and the people who read and submit Usenet news. Not all Internet hosts subscribe to Usenet and not all Usenet hosts are on the Internet. See also: Network News Transfer Protocol, UNIX-to-UNIX CoPy. [Source: NWNET] User Datagram Protocol (UDP) An Internet Standard transport layer protocol defined in STD 6, RFC 768. It is a connectionless protocol which adds a level of reliability and multiplexing to IP. See also: connectionless, Transmission Control Protocol. UTC See: Universal Time Coordinated User Glossary Working Group [Page 48]
RFC 1392 Internet Glossary January 1993 UUCP See: UNIX-to-UNIX CoPy virtual circuit A network service which provides connection-oriented service regardless of the underlying network structure. See also: connection-oriented. virus A program which replicates itself on computer systems by incorporating itself into other programs which are shared among computer systems. See also: Trojan Horse, worm. W3 See: World Wide Web WAIS See: Wide Area Information Servers WAN See: Wide area network WG Working Group white pages The Internet supports several databases that contain basic information about users, such as email addresses, telephone numbers, and postal addresses. These databases can be searched to get information about particular individuals. Because they serve a function akin to the telephone book, these databases are often referred to as "white pages. See also: Knowbot, WHOIS, X.500. WHOIS An Internet program which allows users to query a database of people and other Internet entities, such as domains, networks, and hosts, kept at the DDN NIC. The information for people shows a person's company name, address, phone number and email address. See also: Defense Data Network Network ..., white pages, Knowbot, X.500. [Source: FYI4] Wide Area Information Servers (WAIS) A distributed information service which offers simple natural language input, indexed searching for fast retrieval, and a "relevance feedback" mechanism which allows the results of initial searches to influence future searches. Public domain implementations are available. See also: archie, Gopher, User Glossary Working Group [Page 49]
RFC 1392 Internet Glossary January 1993 Prospero. Wide Area Network (WAN) A network, usually constructed with serial lines, which covers a large geographic area. See also: Local Area Network, Metropolitan Area Network. World Wide Web (WWW or W3) A hypertext-based, distributed information system created by researchers at CERN in Switzerland. Users may create, edit or browse hypertext documents. The clients and servers are freely available. worm A computer program which replicates itself and is self- propagating. Worms, as opposed to viruses, are meant to spawn in network environments. Network worms were first defined by Shoch & Hupp of Xerox in ACM Communications (March 1982). The Internet worm of November 1988 is perhaps the most famous; it successfully propagated itself on over 6,000 systems across the Internet. See also: Trojan Horse, virus. WRT With Respect To WWW See: World Wide Web WYSIWYG What You See is What You Get X X is the name for TCP/IP based network-oriented window systems. Network window systems allow a program to use a display on a different computer. The most widely-implemented window system is X11 - a component of MIT's Project Athena. X.25 A data communications interface specification developed to describe how data passes into and out of public data communications networks. The CCITT and ISO approved protocol suite defines protocol layers 1 through 3. X.400 The CCITT and ISO standard for electronic mail. It is widely used in Europe and Canada. User Glossary Working Group [Page 50]
RFC 1392 Internet Glossary January 1993 X.500 The CCITT and ISO standard for electronic directory services. See also: white pages, Knowbot, WHOIS. XDR See: eXternal Data Representation Xerox Network System (XNS) A network developed by Xerox corporation. Implementations exist for both 4.3BSD derived systems, as well as the Xerox Star computers. XNS See: Xerox Network System Yellow Pages (YP) A service used by UNIX administrators to manage databases distributed across a network. YP See: Yellow Pages zone A logical group of network devices (AppleTalk). User Glossary Working Group [Page 51]
RFC 1392 Internet Glossary January 1993 References BIG-LAN "BIG-LAN Frequently Asked Questions Memo", BIG-LAN DIGEST V4:I8, February 14, 1992. COMER Comer, D., "Internetworking with TCP/IP: Principles, Protocols and Architecture", Prentice Hall, Englewood Cliffs, NJ, 1991. FYI4 Malkin, G., and A. Marine, "FYI on Questions and Answers: Answers to Commonly asked "New Internet User" Questions", FYI 4, RFC 1325, Xylogics, SRI, May 1992. HACKER "THIS IS THE JARGON FILE", Version 2.9.8, January 1992. HPCC "Grand Challenges 1993: High Performance Computing and Communications", Committee on Physical, Mathmatical and Engineering Sciences of the Federal Coordinating Council for Science, Engineering and Technology. MALAMUD Malamud, C., "Analyzing Sun Networks", Van Nostrand Reinhold, New York, NY, 1992. NNSC "NNSC's Hypercard Tour of the Internet". LAQUEY LaQuey, T. (with J. Ryer), "The Internet Companion: A Beginner's Guide to Global Networking", Addison-Wesley, Reading, MA, 1992. NWNET Kochmer, J., and NorthWestNet, "The Internet Passport: NorthWestNets Guide to Our World Online", NorthWestNet, Bellevue, WA, 1992. RFC1208 Jacobsen, O., and D. Lynch, "A Glossary of Networking Terms", RFC 1208, Interop, Inc., March 1991. STD1 Postel, J., "IAB Official Protocol Standards", STD 1, RFC 1360, Internet Architecture Board, September 1992. STD2 Reynolds, J., and J. Postel, "Assigned Numbers", STD 2, RFC 1340, USC/Information Sciences Institute, July 1992. TAN Tanenbaum, A., "Computer Networks; 2nd ed.", Prentice Hall, Englewood Cliffs, NJ, 1989. ZEN Kehoe, B., "Zen and the Art of the Internet", February 1992. User Glossary Working Group [Page 52]
RFC 1392 Internet Glossary January 1993 Security Considerations While security is not explicitly discussed in this document, some of the glossary's entries are security related. See the entries for Access Control List (ACL), authentication, Computer Emergency Response Team (CERT), cracker, Data Encryption Key (DEK), Data Encryption Standard (DES), encryption, Kerberos, Privacy Enhanced Mail (PEM), Trojan Horse, virus, and worm.



Back to RFC index

 

 



Sponsered-Sites:

Register domain name and transfer | Cheap webhosting service | Domain name registration

 

 

""