Internet Users' Glossary
RFC 1983
Document | Type |
RFC - Informational
(August 1996; No errata)
Obsoletes RFC 1392
Also known as FYI 18
|
|
---|---|---|---|
Author | Gary Malkin | ||
Last updated | 2013-03-02 | ||
Stream | Internent Engineering Task Force (IETF) | ||
Formats | plain text html pdf htmlized (tools) htmlized bibtex | ||
Stream | WG state | (None) | |
Document shepherd | No shepherd assigned | ||
IESG | IESG state | RFC 1983 (Informational) | |
Consensus Boilerplate | Unknown | ||
Telechat date | |||
Responsible AD | (None) | ||
Send notices to | (None) |
Network Working Group G. Malkin, Editor Request for Comments: 1983 Xylogics FYI: 18 August 1996 Obsoletes: 1392 Category: Informational Internet Users' Glossary Status of this Memo This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract There are many networking glossaries in existence. This glossary concentrates on terms which are specific to the Internet. Naturally, there are entries for some basic terms and acronyms because other entries refer to them. Acknowledgements This document is the work of the User Glossary Working Group of the User Services Area of the Internet Engineering Task Force. I would especially like to thank Ryan Moats/InterNIC for his careful review and many contributions to this document. Table of Contents non-letter . . 2 I . . . . . . . 26 R . . . . . . . 46 A . . . . . . . 2 J . . . . . . . 33 S . . . . . . . 49 B . . . . . . . 7 K . . . . . . . 33 T . . . . . . . 52 C . . . . . . . 10 L . . . . . . . 33 U . . . . . . . 55 D . . . . . . . 14 M . . . . . . . 35 V . . . . . . . 57 E . . . . . . . 18 N . . . . . . . 39 W . . . . . . . 57 F . . . . . . . 20 O . . . . . . . 42 X . . . . . . . 59 G . . . . . . . 22 P . . . . . . . 43 Y . . . . . . . 60 H . . . . . . . 23 Q . . . . . . . 46 Z . . . . . . . 60 References . . . . . . . . . . . . . . . . . . . . . . . . . . 61 Security Considerations . . . . . . . . . . . . . . . . . . . . 62 Editor's Address . . . . . . . . . . . . . . . . . . . . . . . 62 Malkin Informational [Page 1] RFC 1983 Glossary August 1996 Glossary 10Base2 A physical layer communications specification for 10Mbps, baseband data transmission over a coaxial cable (Thinnet) with a maximum cable segment length of 200 meters. 10Base5 A physical layer communications specification for 10Mbps, baseband data transmission over a coaxial cable (Thicknet) with a maximum cable segment length of 500 meters. 10BaseF A physical layer communications specification for 10Mbps, baseband data transmission over a fiber-optic cable. 10BaseT A physical layer communications specification for 10Mbps, baseband data transmission over a twisted-pair copper wire. 802.x The set of IEEE standards for the definition of LAN protocols. See also: IEEE. 822 See: RFC 822 :-) This odd symbol is one of the ways a person can portray "mood" in the very flat medium of computers--by using "smiley faces". This is "metacommunication", and there are literally hundreds of such symbols, from the obvious to the obscure. This particular example expresses "happiness". Don't see it? Tilt your head to the left 90 degrees. Smiles are also used to denote sarcasm. [Source: ZEN] abstract syntax A description of a data structure that is independent of machine- oriented structures and encodings. [Source: RFC1208] Abstract Syntax Notation One (ASN.1) The language used by the OSI protocols for describing abstract syntax. This language is also used to encode SNMP packets. ASN.1 is defined in ISO documents 8824.2 and 8825.2. See also: Basic Encoding Rules. Malkin Informational [Page 2] RFC 1983 Glossary August 1996 Acceptable Use Policy (AUP) Many transit networks have policies which restrict the use to which the network may be put. For example, some networks may only be used for non-commercial purposes. Some AUPs limit the type of material which can be made available to the public (e.g., pornographic material). Enforcement of AUPs varies with the network. See also: netiquette. Access Control List (ACL) Most network security systems operate by allowing selective use of services. An Access Control List is the usual means by which access to, and denial of, services is controlled. It is simply a list of the services available, each with a list of the hosts permitted to use the service. ACK See: Acknowledgment acknowledgment (ACK) A type of message sent to indicate that a block of data arrived at its destination without error. See also: Negative Acknowledgement. [Source: NNSC] ACL See: Access Control List AD See: Administrative Domain address There are four types of addresses in common use within theShow full document text