IPNA - Index of Terms

10Base2
1-77
10Base5
1-77
10BaseT
1-80
802.x
1-67ff
AAA
5-19
accept()
4-13ff
accounting
5-19, 5-21, 8-4
accounting management
8-4
acknowledgement, ACK
3-23, 6-14
additive increase
3-49
Address
1-68, 2-33ff, 10-4, 10-6ff, 10-24
address conversion
4-14
address lease
5-11
adjacent layer protocol
2-9f
admission control
7-7
agent
8-6
aggregation
6-22f
alias
4-26
alignment
10-5
ALOHA
1-27
anonymous networking
2-76
API
4-3
Appletalk
5-12
Application Layer
1-58, 2-9
April fool
1-54
ARP
2-11, 2-62ff, 2-68, 2-72
Arpanet
1-27ff
ASCII
1-53
ASN.1
2-11, 8-14ff
assigned numbers
2-24, 2-96, 3-63
ATM
1-62, 1-89
ATMARP
2-11
audio coding
4-66, 5-24
AUI
1-77
authentication
5-19, 8-18, 9-5, 9-11, 9-18, 9-20
authorization
5-19, 8-18, 9-4f
authority
4-18
Auto-Configuration
1-88, 10-17
Autonomous System
2-84ff
availability
7-6, 9-7
Backbone, example
1-31
backoff (TCP)
3-27, 3-48
baselining
8-9
bastion host
9-28f
BBN
1-27
best effort
2-7, 2-18, 7-9
BGP
2-11, 2-87f, 8-13
big endian
2-29
big windows (TCP)
3-5
binary trie
2-77
bind()
4-13ff
blocking
6-12
BNC
1-77
boot file
5-8ff
bootp
2-11, 5-7ff
bridge
1-81
bridged network
2-16
broadcast
1-88, 2-34
byte order
2-29
byte-range request
4-42
C
1-3
cache
4-48
call control
4-67ff
Canarie
1-28
canonical name (DNS: CNAME)
4-20
CDMA
1-61
CGI
9-8
Cheapernet
1-77
chunk
3-70
CIDR
2-37, 2-77
Circuit Switching
1-60f
class A,B,C,D,E
2-33
classful address
2-33
client-server
4-6f
CLNP
5-12
close()
4-13ff
coefficient of variation
6-4
collision detection
1-72ff
community string
8-22, 9-8
complementary distribution function
6-7
compliance
3-3
confidence interval
6-4, 6-28
configuration management
8-4, 8-7f, 8-18
Congestion Avoidance
3-50
Congestion Control
3-39, 3-47ff, 5-31f
Congestion Window
3-47, 3-49ff, 3-57
connect()
4-13ff
connection
3-14, 3-28ff
Connectionless
1-62ff
Connection oriented
1-62ff
Connectivity
1-29, 1-33ff
contract
8-4
control bits (TCP)
3-17
control connection (FTP)
4-62
Conversion
1-88
cookie
4-51
COPS
7-17
CRC
1-88
CSMA/CD
1-67, 1-72
datagram
2-19, 3-67f
DECnet
5-12
default route
2-17, 2-69ff
delay
6-11, 6-32, 7-5
delayed acknowledgement
3-45
delegation
4-18
delineation
2-18
denial of service (DoS)
9-6f, 9-9
dial-up
1-44, 5-19
Differentiated Services
2-22, 7-12f
Diffie-Hellman
9-20
Dijkstra
2-83
discovery
10-17, 10-20
distance vector
2-80ff
distribution function
6-7
DHCP
2-11, 5-7, 5-11
DoD
2-27
don't fragment
2-23, 2-48
DNS
2-11, 4-18ff, 9-7, 10-19
DSCP
2-28
duplex
3-6
dynamic page
4-46
dynamic route
2-17
E1, E2, E3
1-75
eavesdropping
9-4f
echo request (ICMP)
2-52f
elastic
3-39
e-mail
4-26ff
encryption
5-16, 9-10ff
end-to-end principle
4-5
end system
2-17
entertainment sector
1-32
Erlang
6-12
Ethernet
1-67ff
event correlation
8-12
expectation
6-5, 6-32
Explicit Congestion Notification, ECN
3-61
extension header
10-13
exterior gateway protocol
2-85
Extranet
5-14, 5-16
fair share
3-39
Fast Retransmit
3-51
Fast Recovery
3-51, 3-52
fault
8-4
fault management 8-4, 8-11
FDM
1-61
Finite State Machine, FSM
3-29ff
firewall
5-14, 9-23ff
Flow Control
3-39ff
flow label
7-15, 10-16, 10-24
forwarding
2-78
fractal
6-23
fragmentation
2-7, 2-18, 2-42ff, 10-10, 10-15
fragment offset
2-23
Frame Format
1-70
FTAM
1-92
FTP
1-92, 2-11, 4-60ff, 10-19
gatekeeper
4-65, 5-23
gateway
1-92, 5-14, 9-26
gopher
1-28
GPRS
5-28
grade of service (GoS)
7-4
growth
1-32, 1-40f, 7-10, 8-10, 10-5
GSM
5-28
H.323
4-65, 4-67ff
HDLC
1-67, 5-20
header
2-19ff, 3-13ff, 4-21, 4-32, 10-9ff
header checksum
2-25, 2-72, 5-15, 10-19
header compression
5-29
heavy tail
6-17, 6-22
History
1-27
- Arpanet
1-30
host ID
2-33
hourglass model
2-12
HTML
4-43
HTTP
2-11, 4-41ff
https
9-21
Hub
1-80
Hurst parameter
6-24ff, 6-32
IAB
1-47
IANA
1-47
ICANN
1-47
ICMP
2-11, 2-50ff, 10-20
identification (datagram)
2-23
IEEE 802.x
1-67ff
IESG
1-47
IETF
1-47ff
IGMP
1-89, 2-11, 10-20
IMAP
4-39, 9-8
IMP
1-27
in-addr.arpa
4-18
in-band
8-5
infinite variance
6-17, 6-29
information hiding
2-69
information model
8-5
initial sequence number
3-15
Integrated Services
7-15
integrity
9-5
interior gateway protocol
2-85
Internet2
1-28
Internet draft
1-51
Internet header length
2-21
Internetwork Layer
1-58, 2-9
Intranet
5-14ff
intrusion
9-16
IP
2-11ff, 10-4ff
IPnG
10-4ff
IPR
1-53
IPsec
9-19
IRTF
1-47, 1-50
ISDN
1-58, 1-62
ISOC
1-47
ISP
5-4, 5-19
Jumbo payload
10-14
Karn's algorithm
3-27
Kerberos
9-18
key exchange
9-20
key management
9-19, 10-18
KISS
1-64
label
4-18, 4-24
LAN
1-65ff
LAT
5-12
LDP
7-20
leased line
2-76, 5-16
limited broadcast
2-35, 5-8
link state
2-80
listen()
4-13ff
little endian
2-29
Local Area Network
1-65ff
Logical Link Layer, LLC
1-58, 1-67, 2-9
loop (routing)
2-56, 2-79, 2-89
loopback
2-35
mailbox
4-26f
mail exchanger (DNS: MX)
4-20, 4-28
management architecture
8-6
Management Information Base (MIB)
8-14ff
maps, Arpanet
1-30
maths
1-3
Maximum Segment Lifetime
3-30, 3-31
Maximum Segment Size
3-21
MBONE
1-28
mean value
6-4
media gateway
5-23
media gateway controller
5-23
merger
5-14
Message Sequence Chart, MSC
3-29ff
metric transformation
2-88
M/G/1
6-11
migration
10-21
MIME
2-11, 4-29, 4-34f, 9-8, 9-22
mixing
3-72
mobile IP
5-26f
modem pool
5-17, 5-19
monitoring
8-9
more fragments
2-23
Mosaic
1-28
MPLS
7-19
MSS
3-21, 6-14, 10-14
MTU
2-27, 2-42ff, 3-21, 6-14
multicast address
2-33, 10-6
multi-homed
3-67
multiplicative decrease
3-48
Nagle's algorithm
3-43, 3-46
Name
1-68
name space
4-18ff
negative acknowledgement (NACK)
3-23
Network Address Translation (NAT)
5-14f, 10-23
network byte order
2-29
network ID
2-33
Network Layer
1-58, 2-9
network performance
7-4
Network Management
8-1ff
network mask
2-36, 5-8
next hop
2-7, 2-17, 2-69ff, 2-81
NFS
2-11, 5-7, 5-10
NSFNET
1-28
OC-x
1-75
options
2-25ff, 2-46, 3-20, 4-57f
OSI
1-57, 5-12
OSPF
2-90
OUI
1-69
overdimensioning
7-10
packet loss
3-10, 5-31f, 7-5
packet size
6-14, 6-30
Packet Switching, PS
1-62ff
padding
2-25, 2-95, 3-19
passive Open (TCP)
3-7, 3-30, 3-32
Path MTU Discovery
3-21, 10-15
PCM
1-75
peer to peer protocol
2-9
performance management
8-4, 8-9f
per hop behavior
7-12f
persistent connection
4-46
PGP
9-22
Physical layer, PHY
1-58, 2-9
piggy-backing (TCP)
3-6, 3-15, 3-22
ping
2-53
pipelining
4-46
point of presence (PoP)
5-19
policing
7-12, 7-15
policy
7-17
Pollaczek-Khintchine formula
6-11
POP3
4-36ff, 9-8
port
2-92, 3-14, 5-15
POTS
5-23
power law
6-20
PPP
1-44, 2-11, 5-20
precedence
2-22
prefix
2-36ff, 2-77
private key
9-12
private networks
2-41, 5-14
priority
7-10, 7-12f
process
4-6f
profile
3-72
protocol
2-15
protocol number
2-24
protocol stack
2-13
proxy
1-91, 4-48, 5-14
pseudo header
2-94f, 3-18
public key
9-13ff
push (TCP)
3-6
Quality of Service (QoS)
7-1ff
RADIUS
5-21, 9-18
Random Early Detection, RED
3-61
random variable
6-5
rank
1-42
RARP
2-65f, 5-8
reassembly
2-56
recursion
4-22
reliability
7-6
reliable transport
3-8
remote access service (RAS)
5-19
remote bridge
1-87
remote LAN access (RLA)
5-17
Reno
3-5, 3-51f, 3-55
repeater
1-78ff
replay attack
9-9
reply code
4-8ff, 4-45
research groups, IRTF
1-50
restoration
8-11
retransmission timer (TCP)
3-9, 3-22ff
reverse lookup (DNS)
4-18
RFC
1-51
RIP
2-11, 2-89
rlogin
2-11
ROADS
2-37
route
1-68
router
1-90, 1-92
router advertisement
2-59
routing
2-68ff, 8-13
routing algorithm
2-71, 2-75, 2-78
routing protocol
2-78, 2-79ff, 2-84ff, 10-19
routing table
1-90, 2-69ff, 2-78, 8-7
RPC
2-11, 9-8
rsh
2-11
RSVP
7-16, 7-20
RTCP
3-71
RTP
2-11, 3-71ff
RTT estimation
3-24ff
running code
1-48, 1-53
SCTP
3-67ff
security
9-1ff, 9-30, 10-18
security management
8-4
segmentation
2-18, 2-44
selective acknowledgement, SACK (TCP)
3-5, 3-52
self-clocking
3-46
self-similar
6-23f
sequence integrity
2-7
sequence number
3-15, 3-23
service level agreement (SLA)
7-13, 7-23f, 8-4
shaping
7-13
shortest path
2-83
signature
9-10ff
Silly Window Syndrome (SWS)
3-43
simulation
6-28ff
single point of failure
1-77
SIP
4-65, 4-74f
slash notation (CIDR)
2-38
SLIP
1-44, 2-11, 5-20
slow start
3-49
SMTP
1-92, 2-11, 4-29ff
SNAP
1-70, 2-42
SNMP
2-11, 8-5, 8-18ff
socket
4-12ff, 10-19
soft state
7-16
source routing
2-27, 4-27
spanning tree
1-81, 1-84ff
spoofing
9-9
spool area
4-26
SSL
9-21
standard
1-52
startup time (TCP)
3-58ff
state machine
2-15
stateless
4-41
static route
2-17
station cache (bridge)
1-82
steady state
6-28
steganography
9-11, 9-15
store and forward
1-81
stub network
9-28
subnet addressing
2-36, 2-74
subnet mask
2-36, 2-58, 2-74
Subnetwork Layer
1-58, 2-9
supernetting
2-37
switch
1-89
symmetry
6-15
T1, T2, T3
1-75
tag (HTML)
4-43f
Tahoe
3-51
take rate
1-32
TCP
2-11, 3-1ff, 6-16
TCP control block, TCB
3-28
TDMA
1-61
teleworking
5-17
telnet
1-92, 2-11, 4-53ff
Termination Resistor
1-77
TFTP
2-11, 5-7, 5-10
Thick Ethernet
1-77
Thin Ethernet
1-77
thread
4-7
Three-Way Handshake
3-36
throughput
3-57
Time to Live
2-24, 2-56, 2-72, 10-9ff
TLV
8-17, 10-12
Token Bus
1-67
Token Ring
1-67
topology discovery
8-7
T plug
1-77
trace
6-30
traffic engineering
7-21
Transceiver
1-77
transmission window
3-11f, 3-40ff
Transport Layer
1-58, 2-9
trap
8-6, 8-20
triangular routing
5-27
trust center
9-13
tunneling
1-58, 2-9, 5-16, 9-19, 10-21f
type of service (TOS)
2-22, 2-28, 7-12f, 10-9ff
UDP
2-11, 2-92ff, 3-71
Unix
1-28
unreachable
2-54
uplink
1-80
urgent data
3-19
URL
4-42
variance
6-4, 6-32
variance time plot
6-24f
Vegas
3-53f
version
2-21
virtual connection
1-63, 3-6
virtual file system
4-5, 4-60
virtual private network (VPN)
5-16
virtual terminal
4-5, 4-53ff
virus
4-27, 9-9, 9-16
Voice over IP
4-65ff, 5-23f, 6-31
waiting time
6-11, 6-32
WDM
1-61
well known port
2-96, 4-6
Working groups, IETF
1-49
X.25
1-62
X.29
1-92
X.400
1-92
XDR
2-11
xDSL
1-44, 5-19
Yellow Cable
1-77
zero window probing
3-42