IPNA - Index of Terms
- 10Base2
- 1-77
- 10Base5
- 1-77
- 10BaseT
- 1-80
- 802.x
- 1-67ff
- AAA
- 5-19
- accept()
- 4-13ff
- accounting
- 5-19, 5-21, 8-4
- accounting management
- 8-4
- acknowledgement, ACK
- 3-23, 6-14
- additive increase
- 3-49
- Address
- 1-68, 2-33ff, 10-4, 10-6ff, 10-24
- address conversion
- 4-14
- address lease
- 5-11
- adjacent layer protocol
- 2-9f
- admission control
- 7-7
- agent
- 8-6
- aggregation
- 6-22f
- alias
- 4-26
- alignment
- 10-5
- ALOHA
- 1-27
- anonymous networking
- 2-76
- API
- 4-3
- Appletalk
- 5-12
- Application Layer
- 1-58, 2-9
- April fool
- 1-54
- ARP
- 2-11, 2-62ff, 2-68, 2-72
- Arpanet
- 1-27ff
- ASCII
- 1-53
- ASN.1
- 2-11, 8-14ff
- assigned numbers
- 2-24, 2-96, 3-63
- ATM
- 1-62, 1-89
- ATMARP
- 2-11
- audio coding
- 4-66, 5-24
- AUI
- 1-77
- authentication
- 5-19, 8-18, 9-5, 9-11, 9-18, 9-20
- authorization
- 5-19, 8-18, 9-4f
- authority
- 4-18
- Auto-Configuration
- 1-88, 10-17
- Autonomous System
- 2-84ff
- availability
- 7-6, 9-7
- Backbone, example
- 1-31
- backoff (TCP)
- 3-27, 3-48
- baselining
- 8-9
- bastion host
- 9-28f
- BBN
- 1-27
- best effort
- 2-7, 2-18, 7-9
- BGP
- 2-11, 2-87f, 8-13
- big endian
- 2-29
- big windows (TCP)
- 3-5
- binary trie
- 2-77
- bind()
- 4-13ff
- blocking
- 6-12
- BNC
- 1-77
- boot file
- 5-8ff
- bootp
- 2-11, 5-7ff
- bridge
- 1-81
- bridged network
- 2-16
- broadcast
- 1-88, 2-34
- byte order
- 2-29
- byte-range request
- 4-42
- C
- 1-3
- cache
- 4-48
- call control
- 4-67ff
- Canarie
- 1-28
- canonical name (DNS: CNAME)
- 4-20
- CDMA
- 1-61
- CGI
- 9-8
- Cheapernet
- 1-77
- chunk
- 3-70
- CIDR
- 2-37, 2-77
- Circuit Switching
- 1-60f
- class A,B,C,D,E
- 2-33
- classful address
- 2-33
- client-server
- 4-6f
- CLNP
- 5-12
- close()
- 4-13ff
- coefficient of variation
- 6-4
- collision detection
- 1-72ff
- community string
- 8-22, 9-8
- complementary distribution function
- 6-7
- compliance
- 3-3
- confidence interval
- 6-4, 6-28
- configuration management
- 8-4, 8-7f, 8-18
- Congestion Avoidance
- 3-50
- Congestion Control
- 3-39, 3-47ff, 5-31f
- Congestion Window
- 3-47, 3-49ff, 3-57
- connect()
- 4-13ff
- connection
- 3-14, 3-28ff
- Connectionless
- 1-62ff
- Connection oriented
- 1-62ff
- Connectivity
- 1-29, 1-33ff
- contract
- 8-4
- control bits (TCP)
- 3-17
- control connection (FTP)
- 4-62
- Conversion
- 1-88
- cookie
- 4-51
- COPS
- 7-17
- CRC
- 1-88
- CSMA/CD
- 1-67, 1-72
- datagram
- 2-19, 3-67f
- DECnet
- 5-12
- default route
- 2-17, 2-69ff
- delay
- 6-11, 6-32, 7-5
- delayed acknowledgement
- 3-45
- delegation
- 4-18
- delineation
- 2-18
- denial of service (DoS)
- 9-6f, 9-9
- dial-up
- 1-44, 5-19
- Differentiated Services
- 2-22, 7-12f
- Diffie-Hellman
- 9-20
- Dijkstra
- 2-83
- discovery
- 10-17, 10-20
- distance vector
- 2-80ff
- distribution function
- 6-7
- DHCP
- 2-11, 5-7, 5-11
- DoD
- 2-27
- don't fragment
- 2-23, 2-48
- DNS
- 2-11, 4-18ff, 9-7, 10-19
- DSCP
- 2-28
- duplex
- 3-6
- dynamic page
- 4-46
- dynamic route
- 2-17
- E1, E2, E3
- 1-75
- eavesdropping
- 9-4f
- echo request (ICMP)
- 2-52f
- elastic
- 3-39
- e-mail
- 4-26ff
- encryption
- 5-16, 9-10ff
- end-to-end principle
- 4-5
- end system
- 2-17
- entertainment sector
- 1-32
- Erlang
- 6-12
- Ethernet
- 1-67ff
- event correlation
- 8-12
- expectation
- 6-5, 6-32
- Explicit Congestion Notification, ECN
- 3-61
- extension header
- 10-13
- exterior gateway protocol
- 2-85
- Extranet
- 5-14, 5-16
- fair share
- 3-39
- Fast Retransmit
- 3-51
- Fast Recovery
- 3-51, 3-52
- fault
- 8-4
- fault management 8-4, 8-11
- FDM
- 1-61
- Finite State Machine, FSM
- 3-29ff
- firewall
- 5-14, 9-23ff
- Flow Control
- 3-39ff
- flow label
- 7-15, 10-16, 10-24
- forwarding
- 2-78
- fractal
- 6-23
- fragmentation
- 2-7, 2-18, 2-42ff, 10-10, 10-15
- fragment offset
- 2-23
- Frame Format
- 1-70
- FTAM
- 1-92
- FTP
- 1-92, 2-11, 4-60ff, 10-19
- gatekeeper
- 4-65, 5-23
- gateway
- 1-92, 5-14, 9-26
- gopher
- 1-28
- GPRS
- 5-28
- grade of service (GoS)
- 7-4
- growth
- 1-32, 1-40f, 7-10, 8-10, 10-5
- GSM
- 5-28
- H.323
- 4-65, 4-67ff
- HDLC
- 1-67, 5-20
- header
- 2-19ff, 3-13ff, 4-21, 4-32, 10-9ff
- header checksum
- 2-25, 2-72, 5-15, 10-19
- header compression
- 5-29
- heavy tail
- 6-17, 6-22
- History
- 1-27
- - Arpanet
- 1-30
- host ID
- 2-33
- hourglass model
- 2-12
- HTML
- 4-43
- HTTP
- 2-11, 4-41ff
- https
- 9-21
- Hub
- 1-80
- Hurst parameter
- 6-24ff, 6-32
- IAB
- 1-47
- IANA
- 1-47
- ICANN
- 1-47
- ICMP
- 2-11, 2-50ff, 10-20
- identification (datagram)
- 2-23
- IEEE 802.x
- 1-67ff
- IESG
- 1-47
- IETF
- 1-47ff
- IGMP
- 1-89, 2-11, 10-20
- IMAP
- 4-39, 9-8
- IMP
- 1-27
- in-addr.arpa
- 4-18
- in-band
- 8-5
- infinite variance
- 6-17, 6-29
- information hiding
- 2-69
- information model
- 8-5
- initial sequence number
- 3-15
- Integrated Services
- 7-15
- integrity
- 9-5
- interior gateway protocol
- 2-85
- Internet2
- 1-28
- Internet draft
- 1-51
- Internet header length
- 2-21
- Internetwork Layer
- 1-58, 2-9
- Intranet
- 5-14ff
- intrusion
- 9-16
- IP
- 2-11ff, 10-4ff
- IPnG
- 10-4ff
- IPR
- 1-53
- IPsec
- 9-19
- IRTF
- 1-47, 1-50
- ISDN
- 1-58, 1-62
- ISOC
- 1-47
- ISP
- 5-4, 5-19
- Jumbo payload
- 10-14
- Karn's algorithm
- 3-27
- Kerberos
- 9-18
- key exchange
- 9-20
- key management
- 9-19, 10-18
- KISS
- 1-64
- label
- 4-18, 4-24
- LAN
- 1-65ff
- LAT
- 5-12
- LDP
- 7-20
- leased line
- 2-76, 5-16
- limited broadcast
- 2-35, 5-8
- link state
- 2-80
- listen()
- 4-13ff
- little endian
- 2-29
- Local Area Network
- 1-65ff
- Logical Link Layer, LLC
- 1-58, 1-67, 2-9
- loop (routing)
- 2-56, 2-79, 2-89
- loopback
- 2-35
- mailbox
- 4-26f
- mail exchanger (DNS: MX)
- 4-20, 4-28
- management architecture
- 8-6
- Management Information Base (MIB)
- 8-14ff
- maps, Arpanet
- 1-30
- maths
- 1-3
- Maximum Segment Lifetime
- 3-30, 3-31
- Maximum Segment Size
- 3-21
- MBONE
- 1-28
- mean value
- 6-4
- media gateway
- 5-23
- media gateway controller
- 5-23
- merger
- 5-14
- Message Sequence Chart, MSC
- 3-29ff
- metric transformation
- 2-88
- M/G/1
- 6-11
- migration
- 10-21
- MIME
- 2-11, 4-29, 4-34f, 9-8, 9-22
- mixing
- 3-72
- mobile IP
- 5-26f
- modem pool
- 5-17, 5-19
- monitoring
- 8-9
- more fragments
- 2-23
- Mosaic
- 1-28
- MPLS
- 7-19
- MSS
- 3-21, 6-14, 10-14
- MTU
- 2-27, 2-42ff, 3-21, 6-14
- multicast address
- 2-33, 10-6
- multi-homed
- 3-67
- multiplicative decrease
- 3-48
- Nagle's algorithm
- 3-43, 3-46
- Name
- 1-68
- name space
- 4-18ff
- negative acknowledgement (NACK)
- 3-23
- Network Address Translation (NAT)
- 5-14f, 10-23
- network byte order
- 2-29
- network ID
- 2-33
- Network Layer
- 1-58, 2-9
- network performance
- 7-4
- Network Management
- 8-1ff
- network mask
- 2-36, 5-8
- next hop
- 2-7, 2-17, 2-69ff, 2-81
- NFS
- 2-11, 5-7, 5-10
- NSFNET
- 1-28
- OC-x
- 1-75
- options
- 2-25ff, 2-46, 3-20, 4-57f
- OSI
- 1-57, 5-12
- OSPF
- 2-90
- OUI
- 1-69
- overdimensioning
- 7-10
- packet loss
- 3-10, 5-31f, 7-5
- packet size
- 6-14, 6-30
- Packet Switching, PS
- 1-62ff
- padding
- 2-25, 2-95, 3-19
- passive Open (TCP)
- 3-7, 3-30, 3-32
- Path MTU Discovery
- 3-21, 10-15
- PCM
- 1-75
- peer to peer protocol
- 2-9
- performance management
- 8-4, 8-9f
- per hop behavior
- 7-12f
- persistent connection
- 4-46
- PGP
- 9-22
- Physical layer, PHY
- 1-58, 2-9
- piggy-backing (TCP)
- 3-6, 3-15, 3-22
- ping
- 2-53
- pipelining
- 4-46
- point of presence (PoP)
- 5-19
- policing
- 7-12, 7-15
- policy
- 7-17
- Pollaczek-Khintchine formula
- 6-11
- POP3
- 4-36ff, 9-8
- port
- 2-92, 3-14, 5-15
- POTS
- 5-23
- power law
- 6-20
- PPP
- 1-44, 2-11, 5-20
- precedence
- 2-22
- prefix
- 2-36ff, 2-77
- private key
- 9-12
- private networks
- 2-41, 5-14
- priority
- 7-10, 7-12f
- process
- 4-6f
- profile
- 3-72
- protocol
- 2-15
- protocol number
- 2-24
- protocol stack
- 2-13
- proxy
- 1-91, 4-48, 5-14
- pseudo header
- 2-94f, 3-18
- public key
- 9-13ff
- push (TCP)
- 3-6
- Quality of Service (QoS)
- 7-1ff
- RADIUS
- 5-21, 9-18
- Random Early Detection, RED
- 3-61
- random variable
- 6-5
- rank
- 1-42
- RARP
- 2-65f, 5-8
- reassembly
- 2-56
- recursion
- 4-22
- reliability
- 7-6
- reliable transport
- 3-8
- remote access service (RAS)
- 5-19
- remote bridge
- 1-87
- remote LAN access (RLA)
- 5-17
- Reno
- 3-5, 3-51f, 3-55
- repeater
- 1-78ff
- replay attack
- 9-9
- reply code
- 4-8ff, 4-45
- research groups, IRTF
- 1-50
- restoration
- 8-11
- retransmission timer (TCP)
- 3-9, 3-22ff
- reverse lookup (DNS)
- 4-18
- RFC
- 1-51
- RIP
- 2-11, 2-89
- rlogin
- 2-11
- ROADS
- 2-37
- route
- 1-68
- router
- 1-90, 1-92
- router advertisement
- 2-59
- routing
- 2-68ff, 8-13
- routing algorithm
- 2-71, 2-75, 2-78
- routing protocol
- 2-78, 2-79ff, 2-84ff, 10-19
- routing table
- 1-90, 2-69ff, 2-78, 8-7
- RPC
- 2-11, 9-8
- rsh
- 2-11
- RSVP
- 7-16, 7-20
- RTCP
- 3-71
- RTP
- 2-11, 3-71ff
- RTT estimation
- 3-24ff
- running code
- 1-48, 1-53
- SCTP
- 3-67ff
- security
- 9-1ff, 9-30, 10-18
- security management
- 8-4
- segmentation
- 2-18, 2-44
- selective acknowledgement, SACK (TCP)
- 3-5, 3-52
- self-clocking
- 3-46
- self-similar
- 6-23f
- sequence integrity
- 2-7
- sequence number
- 3-15, 3-23
- service level agreement (SLA)
- 7-13, 7-23f, 8-4
- shaping
- 7-13
- shortest path
- 2-83
- signature
- 9-10ff
- Silly Window Syndrome (SWS)
- 3-43
- simulation
- 6-28ff
- single point of failure
- 1-77
- SIP
- 4-65, 4-74f
- slash notation (CIDR)
- 2-38
- SLIP
- 1-44, 2-11, 5-20
- slow start
- 3-49
- SMTP
- 1-92, 2-11, 4-29ff
- SNAP
- 1-70, 2-42
- SNMP
- 2-11, 8-5, 8-18ff
- socket
- 4-12ff, 10-19
- soft state
- 7-16
- source routing
- 2-27, 4-27
- spanning tree
- 1-81, 1-84ff
- spoofing
- 9-9
- spool area
- 4-26
- SSL
- 9-21
- standard
- 1-52
- startup time (TCP)
- 3-58ff
- state machine
- 2-15
- stateless
- 4-41
- static route
- 2-17
- station cache (bridge)
- 1-82
- steady state
- 6-28
- steganography
- 9-11, 9-15
- store and forward
- 1-81
- stub network
- 9-28
- subnet addressing
- 2-36, 2-74
- subnet mask
- 2-36, 2-58, 2-74
- Subnetwork Layer
- 1-58, 2-9
- supernetting
- 2-37
- switch
- 1-89
- symmetry
- 6-15
- T1, T2, T3
- 1-75
- tag (HTML)
- 4-43f
- Tahoe
- 3-51
- take rate
- 1-32
- TCP
- 2-11, 3-1ff, 6-16
- TCP control block, TCB
- 3-28
- TDMA
- 1-61
- teleworking
- 5-17
- telnet
- 1-92, 2-11, 4-53ff
- Termination Resistor
- 1-77
- TFTP
- 2-11, 5-7, 5-10
- Thick Ethernet
- 1-77
- Thin Ethernet
- 1-77
- thread
- 4-7
- Three-Way Handshake
- 3-36
- throughput
- 3-57
- Time to Live
- 2-24, 2-56, 2-72, 10-9ff
- TLV
- 8-17, 10-12
- Token Bus
- 1-67
- Token Ring
- 1-67
- topology discovery
- 8-7
- T plug
- 1-77
- trace
- 6-30
- traffic engineering
- 7-21
- Transceiver
- 1-77
- transmission window
- 3-11f, 3-40ff
- Transport Layer
- 1-58, 2-9
- trap
- 8-6, 8-20
- triangular routing
- 5-27
- trust center
- 9-13
- tunneling
- 1-58, 2-9, 5-16, 9-19, 10-21f
- type of service (TOS)
- 2-22, 2-28, 7-12f, 10-9ff
- UDP
- 2-11, 2-92ff, 3-71
- Unix
- 1-28
- unreachable
- 2-54
- uplink
- 1-80
- urgent data
- 3-19
- URL
- 4-42
- variance
- 6-4, 6-32
- variance time plot
- 6-24f
- Vegas
- 3-53f
- version
- 2-21
- virtual connection
- 1-63, 3-6
- virtual file system
- 4-5, 4-60
- virtual private network (VPN)
- 5-16
- virtual terminal
- 4-5, 4-53ff
- virus
- 4-27, 9-9, 9-16
- Voice over IP
- 4-65ff, 5-23f, 6-31
- waiting time
- 6-11, 6-32
- WDM
- 1-61
- well known port
- 2-96, 4-6
- Working groups, IETF
- 1-49
- X.25
- 1-62
- X.29
- 1-92
- X.400
- 1-92
- XDR
- 2-11
- xDSL
- 1-44, 5-19
- Yellow Cable
- 1-77
- zero window probing
- 3-42