You are on page 1of 22

Terms and Acronyms in Networking Acronym/Terms AARP Definition Explanation AppleTalk Address It is a way to map between the Resolution

Protocol physical hardware addresses of computers, such as those known to an Ethernet or token ring local area network, and their temporarily assigned AppleTalk network addresses. Asynchronous Balanced It is a communication mode Mode of HDLC and derivative protocols, supporting peer-oriented point-topoint communications between two nodes, where either node can initiate transmission. Area Border Router It maintains separate link state databases for each area it serves and maintains summarized routes for all areas in the network. Application Configuration It is designed to support remote storage and access of program option, Access Protocol configuration and preference information. The data store model is designed to allow a client relatively simple access to interesting data, to allow new information to be easily added without server re-configuration and to promote the use of both standardized data and custom or proprietary data. Accessing the Internet Via Originally known as Doctor Bob s Email Guide to Offline Internet Access . Advanced Communications Function Network Control Program Access Control List It is the program that controls network communications in a standard SNA. An ACL is a list of user permissions for a file, folder, or other object. It defines what users and groups can access the object and what operations they can perform.

ABM

ABR

ACAP

ACCMAIL

ACF-NCP

ACL

ADC

Analog-to-Digital Converter

ADC

Apple Display Connector

ADCCP

Advanced Communication Procedures

Data Control

ADF

Automatic Feeder

Document

ADSL

Asymmetric Subscriber Line AppleTalk Protocol

Digital

ADSP

DataStream

AESA

ATM End System Address

AFP

Apple Filing Protocol

This device can take an analog signal, such as an electrical current, and digitize it into a binary format that the computer can understand. It is a proprietary modification of the DVI connector that combines analog and digital video signals, USB, and power all in one cable. Apple used ADC for its LCD-based Apple Cinema Displays and their final CRT displays, before deciding to use standard DVI connectors on later models. It is a bit-oriented data link layer protocol used to provide pointto-point and point-tomultipointtransmission of data frames that contain error control information. It places data on a network and ensures proper delivery to a destination. An ADF is used in copiers and scanners to feed pages into the machine. It allows multiple pages to be copied or scanned at one time without the need to place each individual page in the copier or scanner. ADSL is a type of DSL, which is a method of transferring data over copper telephone lines. It is a session-level protocol that provides symmetric, connectionoriented, full-duplex communication between two sockets on the AppleTalk internet. In addition, it handles flowcontrol and reliability. AESA is an ATM, a networking technology that transfers data in packets or cells of a fixed size but with an end system address. It is a proprietary network protocol that offers file services for Mac OS X and original Mac OS. In Mac OS X, AFP is one of several file

AFTP

AGP

AIX AMQP

ANN

services supported including Server Message Block (SMB), Network File System (NFS), File Transfer Protocol (FTP), and WebDAV. AFP currently supports Unicode file names, POSIX and access control list permissions, resource forks, named extended attributes, and advanced file locking. In Mac OS 9 and earlier, AFP was the primary protocol for file services. Anonymous File Transfer It is a common way to make software Protocol available; users are allowed to log in as `guest without a password and copy whatever has been made available Accelerated Graphics Port AGP is a type of expansion slot designed specifically for graphics cards. Advanced Interactive AIX is an operating system developed Executive by IBM and is in fact Unix-based. Advanced Message It mandates the behavior of the Queuing Protocol messaging provider and client to the extent that implementations from different vendors are truly interoperable, in the same way as SMTP, HTTP, FTP, etc. have created interoperable systems. Previous attempts to standardize middleware have happened at the API level (e.g. JMS) and this did not create interoperability. Artificial Neural Network It is usually called neural network (NN), is a mathematical model or computational model that is inspired by the structure and/or functional aspects of biological neural networks. A neural network consists of an interconnected group of artificial neurons, and it processes information using a connectionist approach to computation. In most cases an ANN is anadaptive system that changes its

ANSI

American National Standards Institute

AoE

ATA over Ethernet

API

Application Interface

Program

APCI

Application-Layer Protocol Control Information

ARP

Address Protocol Address and Parameter Area

Resolution

ARPA

Routing

structure based on external or internal information that flows through the network during the learning phase. Modern neural networks are nonlinear statistical data modeling tools. They are usually used to model complex relationships between inputs and outputs or to find patterns in data. ANSI is a U.S.-based non-profit organization that works to develop and promote standards in the United States and around the world. It is a network protocol developed by the Brantley Coile [1] Company, designed for simple, highperformance access of SATA storage devices over Ethernet networks. It is used to build storage area networks (SANs) with low-cost, standard technologies. An API is a set of commands, functions, and protocols which programmers can use when building software for a specific operating system. The definition of its application layer is narrower in scope, explicitly distinguishing additional functionality above the transport layer at two additional levels, the session layer and thepresentation layer. OSI specifies strict modular separation of functionality at these layers and provides protocol implementations for each layer. ARP is a protocol used for mapping an IP address to a computer connected to a local network LAN. The domain name arpa is a top-level domain (TLD) in the Domain Name System of the Internet. It is used exclusively for technical infrastructure purposes.

ARPANET

APIPA

ASP

ATA

ATM

Bcc

BGP

BOOTP

Advanced Research It was the world s first Projects Agency Network operational packet switching network and the core network of a set that came to compose the global Internet. Automatic Private IP It is configuration networking allows Addressing devices such as computers and printers to connect to a network automatically. Without zeroconf, a network administrator must set up services, such as Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS), or configure each computer s network settings manually, which may be difficult and time-consuming. Active Server Pages Pages with the .aspx extension use compiled ASP.NET (based on Microsoft's .NET Framework), which makes them faster and more robust than server-side scripting in ASP, which is interpreted at run-time; however, ASP.NET pages may still include some ASP scripting. The introduction of ASP.NET led to use of the term Classic ASP for the original technology. Advanced Technology It is a type of disk drive that integrates Attachment the drive controller directly on the drive itself. Asynchronous Transfer ATM is a networking technology that Mode transfers data in packets or cells of a fixed size. Blind Carbon Copy Blind carbon copying is a useful way to let others see an e-mail you sent without the main recipient knowing. Border Gateway Protocol It is the protocol backing the core routing decisions on the Internet. It maintains a table of IP networks or prefixes which designate network reachability among autonomous systems. Bootstrap Protocol It is a network protocol used by a network client to obtain an IP

BPDU Bps

Bridge Protocol Data Units Bits per second

BT

Bluetooth

address from a configuration server. It is used to ensure that each bridge has enough information. It is the number of bits that are conveyed or processed per unit of time. It is a proprietary open wireless technology standard for exchanging data over short distances (using short wavelength radio transmissions in the ISM band from 2400-2480 MHz) from fixed and mobile devices, creating personal area networks (PANs) with high levels of security. It can connect several devices, overcoming problems of synchronization.

BTAM

BW

Cc

Ccd

CDN

CHAP

Basic Telecommunications It was a low-level programming Access Method interface specified by IBM for use on the IBM System/360 for sending and receiving data through telecommunication lines. Later, IBM specified higher-level interfaces (QTAM, VTAM) and entire architectures (TSO, SNA). Bandwidth It is a measure of available or consumed data communication resources expressed in bits/second or multiples of it (kilobits/s, megabits/s etc.). Carbon Copy The Cc: option is often used in business communications when a message is intended for one person, but is relevant to other people as well. Charged Coupled Device CCDs are sensors used in digital cameras and video cameras to record still and moving images. Content Distribution It is a system of computers containing Network copies of data placed at various nodes of a network. Challenge-Handshake It authenticates a user or network host

Authentication Protocol

CIDR

Classless Routing

Inter-Domain

CNR

Communications Networking Riser

and

CDMA

Code Division Access

Multiple

CGI

Common Interface

Gateway

CPA

Converged Packet Access

CPAN

Comprehensive Archive Network

Perl

to an authenticating entity. It provides protection against playback attack by the peer through the use of an incrementally changing identifier and of a variable challenge-value. CHAP requires that both the client and server know the plaintext of the secret, although it is never sent over the network. The MS-CHAP variant does not require either peer to know the plaintext, but has other drawbacks. It is a method for allocating IP addresses and routing Internet Protocol packets. It is a slot found on certain PC motherboards and used for specialized networking, audio, and telephony equipment. CDMA is a wireless transmission technology that was developed during World War II by the English allies to avoid having their transmissions jammed. The Common Gateway Interface (CGI) is a set of rules for running scripts and programs on a Web server. It specifies what information is communicated between the Web server and clients Web browsers and how the information is transmitted. It is part of the TCP/IP suite of protocols used for data transferring. UDP is a known as a stateless protocol, meaning it doesn t acknowledge that the packets being sent have been received. is an archive of over 100,000 modules of software written in Perl, as well as documentation for it. It has a presence on the World Wide Web and is mirrored worldwide at more than

CRAN

CTAN

CTCP

DAP

DCCP

200 locations. CPAN can denote either the archive network itself, or the Perl program that acts as an interface to the network and as an automated software installer (somewhat like a package manager). Most software on CPAN is free and open source software. Comprehensive R Archive A core set of packages are included Network with the installation of R, with more than 4300. If there is a problem with the connection, error and status messages regarding the connection are sent using ICMP, which is part of the Internet protocol. Comprehensive TeX It is the authoritative place Archive Network where TeX related material and software can be found for download. Repositories for other projects, such as the MiKTeX distribution of TeX, constantly mirror most of CTAN. Client-To-Client Protocol It extends the original IRC protocol by allowing users to query other clients or channels; this causes all the clients in the channel to reply the CTCP, for specific information. Directory Access Protocol It is a computer networking standard promulgated by ITU-T and ISO in 1988 for accessing an X.500 directory service. DAP was intended to be used by client computer systems, but was not popular as there were few implementations of the full OSI protocol stack for desktop computers available to be run on the hardware and operating systems typical of that time. Datagram Congestion It is a message-oriented Transport Control Protocol Layer protocol. It provides a way to gain access to congestion control mechanisms without having to implement them at the Application

DHCP

DLNA

DNS

DPI

DSL

Layer. Dynamic Host A network server uses this protocol to Configuration Protocol dynamically assign IP addresses to networked computers. The DHCP server waits for a computer to connect to it, and then assigns it an IP address from a master list stored on the server. Digital Living Network It is a non-profit collaborative trade Alliance organization established by Sony in June 2003, that is responsible for defining Interoperability Guidelines to enable sharing of digital media between consumer devices such as computers, printers, cameras, cell phones, and other multimedia devices. Domain Name System The primary purpose of DNS is to keep Web surfers sane and don t go to any other web pages. Deep Packet Inspection It is a form of computer network packet filtering that examines the data part (and possibly also the header) of a packet as it passes an inspection point, searching for protocol noncompliance, viruses, spam, intrusions or predefined criteria to decide if the packet can pass or if it needs to be routed to a different destination, or for the purpose of collecting statistical information. There are multiple headers for IP packets, network equipment only needs to use the first of these (the IP header) for normal operation, but use of the second header (TCP, UDP etc.) is normally considered to be shallow packet inspection (usually called Stateful Packet Inspection) despite this definition. Digital Subscriber Line It is medium for transferring data over regular phone lines and can be used to connect to the Internet.

DSLAM

Digital Subscriber Access Multiplexer

EAP

ECN

EDI

EGP

EIGRP

ESCON

Line It is a device used by Internet Service Providers (ISPs) to route incoming DSL connections to the Internet. Extensible Authentication It is an authentication framework Protocol frequently used in wireless networks and Point-to-Point connections. Explicit Congestion It is an extension to the Internet Notification Protocol and to the Transmission Control Protocol and is defined in RFC 3168. ECN allows end-to-end notification of network congestion without dropping packets. ECN is an optional feature that is only used when both endpoints support it and are willing to use it. It is only effective when supported by the underlying network. Electronic Data It is a standardized method for Interchange transferring data between different computer systems or computer networks. It is commonly used for ecommerce purposes, such as sending orders to warehouses, tracking shipments, and creating invoices. Exterior Gateway Protocol It is a simple reachability protocol, and, unlike modern distance-vector and path-vector protocols, it is limited to tree-like topologies. Enhanced Interior It is an advanced distance-vector Gateway Routing Protocol routing protocol, with optimizations to minimize both the routing instability incurred after topology changes, as well as the use of bandwidth and processing power in the router. Enterprise Systems It allows the establishment and Connection reconfiguration of channel connections dynamically, without having to take equipment off-line and manually move the cables. ESCON supports channel connections using serial transmission over a pair of

FDDI

FDS

FICON

fibers. The ESCON Director supports dynamic switching (which could be achieved prior to ESCON, but not with IBM-only products). It also allows the distance between units to be extended up to 60 km over a dedicated fiber. Permanent virtual circuits are supported through the switch. SCON switching has advantages over a collection of point-to-point links. A peripheral previously capable of accessing a single mainframe can now be connected simultaneously to up to eight mainframes, providing peripheral sharing. Fiber Distributed Data It is a group of networking Interface specifications standardized by ANSI in the mid-1980s. An FDDI network supports data transfer speeds of 100 Mbps over a fiber-optic cable and uses a rotating token to define which system can send data at any given time. Fedora Directory Server It is a server developed by Red Hat, as part of Red Hat s communitysupported Fedora Project. 389 Directory Server is identical to the Red Hat Directory Server, just rebranded. The name 389 is derived from the port number for LDAP. Fiber Connectivity It is a FC layer 4 protocol used to map both IBM s antecedent (either ESCON or parallel) channel-tocontrol-unit cabling infrastructure and protocol onto standard FC services and infrastructure. The topology is fabric utilizing FC switches or directors. Valid rates include 1, 2, 4, and 8. Gigabit data rates at distances up to 100 km. FICON have replaced ESCON in current deployments because of FICON's technical superiority (especially its higher performance) and lower cost.

FTP

File Transfer Protocol

FXP

Gbps

GIOP

GPRS

It is a common method of transferring files via the Internet from one computer to another. File Exchange Protocol It is a method of data transfer which uses FTP to transfer data from one remote server to another (interserver) without routing this data through the client s connection Gigabits per second 1Gbps is equal to 1,000 Megabits per second (Mbps), or 1,000,000,000 bits per second. Gbps is commonly used to measure data transfer speeds between hardware devices. General Inter-ORB It is the abstract protocol by Protocol which object request brokers (ORBs) communicate. General Packet Radio GPRS usage is charged based on Service volume of data. This contrasts with circuit switching data, which is typically billed per minute of connection time, regardless of whether or not the user transfers data during that period. GPRS data is typically supplied either as part of a bundle (e.g., 5 GB per month for a fixed fee) or on a pay-as-you-use basis. Usage above the bundle cap is either charged per megabyte or disallowed. The pay-as-you-use charging is typically per megabyte of traffic.

HDLC

High-Level Control

HTTP

HTTPd

Link It can be used for point to multipoint connections, but is now used almost exclusively to connect one device to another, using what is known as Asynchronous Balanced Mode (ABM). Hyper Text Transfer This is the protocol used to transfer Protocol data over the World Wide Web. That s why all Web site addresses begin with http:// Hypertext Transport It is a computer program that runs as Protocol Daemon a background process, rather than

Data

HTTPS

Hyper Text Transport Protocol Secure Hyper Expansion Transport

HTX

ICMP

Internet Control Message Protocol

ICS

Internet Sharing

Connection

IGMP

Internet Group Management Protocol

IGRP

Interior Gateway Routing Protocol Internet Message Access Protocol

IMAP

InterNIC

Internet Network Information Center

being under the direct control of an interactive user. Typically daemon names end with the letter d: for example, syslogd is the daemon that implements the system logging facility, or sshd, which services incoming SSH connections. HTTPS is the same thing as HTTP, but uses a secure socket layer (SSL) for security purposes. Formerly known as Lightning Data Transport (LDT), is a technology for interconnection of computer processors. It is a bidirectional serial/parallel high-bandwidth, lowlatency point-to-point link. When information is transferred over the Internet, computer systems send and receive data using the TCP/IP protocol. If there is a problem with the connection, error and status messages regarding the connection are sent using ICMP, which is part of the Internet protocol. It allows multiple computers to connect to the Internet using the same Internet connection and IP address. It is an integral part of the IP multicast specification. It is analogous to ICMP for unicast connections. IGMP can be used for online streaming video and gaming, and allows more efficient use of resources when supporting these types of applications. It is used by routers to exchange routing data within an autonomous system. It is a method of accessing e-mail messages on a server without having to download them to your local hard drive. The InterNIC is an organization created by the National Science Foundation to

IP

Internet Protocol

IPX

Internetwork Exchange

Packet

IRC

Internet Relay Chat

ISDN

Integrated Services Digital Network

ISP

Internet Service Provider

JSP

Java Server Page

Kbps KIS

Kilobits Per Second Knowbot Server Information

L2TP

Layer Two Protocol

Tunneling

provide Internet information and domain name registration services. It provides a standard set of rules for sending and receiving data through the Internet. It is a networking protocol used to connect networks based on Novell s NetWare. IPX is connectionless, meaning it doesn t require connections to be maintained during an exchange of packets, like a phone call does. IRC makes it possible for people using the Internet to converse with each other in real time by typing messages back and forth. ISDN is a data transfer technology, created in 1984, that can transfer data significantly faster than a dial-up modem. ISDN enables wide-bandwidth digital transmission over the public telephone network, which means more data can be sent at one time. It is the company that you pay a monthly fee to in order to use the Internet. This standard was developed by Sun Microsystems as an alternative to Microsoft s active server page (ASP) technology. This term is commonly used in describing data transfer rates. A program which, when given a request, searches and retrieves information on the Internet. Also known as intelligent agent, knowledge robot. It is a tunneling protocol used to support virtual private networks (VPNs). It does not provide any encryption or confidentiality by itself; it relies on an encryption

LAN

Local Area Network

LAPB

Link Access Balanced

Procedure,

LAWN

Local Area Network

Wireless

LBA

Logical block addressing

LDAP

Lightweight Directory Access Protocol

LDT

Lightning Data Transport

MAC Address

Media Access Address

Control

MANET

Mobile Ad Hoc Network

protocol that it passes within the tunnel to provide privacy. It is a computer network limited to a small area such as an office building, university, or even a residential home. It implements the data link layer as defined in the X.25 protocol suite. LAPB is a bit-oriented protocol derived from HDLC that ensures that frames are error free and in the right sequence. LAPB is specified in ITU-T Recommendation X.25 and ISO/IEC 7776. It can be used as a Data Link Layer protocol implementing the connection-mode data link service in the OSI Reference Model. A type of local-area network that uses high-frequency radio waves rather than wires to communicate between nodes. It is a common scheme used for specifying the location of blocks of data stored on computer storage devices, generally secondary storage systems such as hard disks. If you want to make directory information available over the Internet, this is the way to do it. LDAP is a streamlined version of an earlier directory standard called X.500. A high-speed interconnection architecture between integrated circuits, introduced in 2001. Codenamed Lightning Data Transport and developed by AMD and others, the LDT I/O Link Specification defines a protocol and electrical interface between the CPU, memory and peripheral devices. It is a hardware identification number that uniquely identifies each device on a network. It is a type of ad hoc network that can

Mbps MTU

Megabits Per Second Maximum Unit Transmission

NAS NAT

Network Access Server Network Translation Address

NetBIOS

Network Basic Input/Output System Network Interface Card

NIC

NNTP

Network News Transfer Protocol

NOC

Network Operation Center

OLAP

Online Processing

Analytical

OSPF

Open Shortest Path First

P2P

Peer to Peer

POP3

Post Office Protocol

change locations and configure itself on the fly. Because MANETS are mobile, they use wireless connections to connect to various networks. One megabit is equal to one million bits or 1,000 kilobits. It is a networking term that defines the largest packet size that can be sent over a network connection. It is a single point of access to a remote resource. It translates the IP addresses of computers in a local network to a single IP address. This address is often used by the router that connects the computers to the Internet. It adds support for networking, including the ability to recognize other devices connected to the network. This is the card that physically makes the connection between the computer and the network cable. It is basically the software foundation of a newsgroup server. It is what queries, distributes, posts, and retrieves news articles. It is the central location where a company s servers and networking equipment are located. It allows users to analyze database information from multiple database systems at one time. It is a method of finding the shortest path from one router to another in a local area network (LAN). The peers are computer systems which are connected to each other via the Internet. Files can be shared directly between systems on the network without the need of a central server. It is a simple, standardized method of delivering e-mail messages.

PPP

Point to Point Protocol

PPPoE

Point-to-Point over Ethernet

Protocol

PPTP

Point-to-Point Protocol

Tunneling

QTAM

Queued Telecommunications Access Method Reverse Address Resolution Protocol

RARP

RIP

Routing Protocol

Information

RPC

Remote Procedure Call

RRAS

Routing and Access Service

Remote

RTP

Real-time Protocol

Transport

It is the Internet standard for dial-up modem connections. PPP is a set of rules that defines how your modem exchanges packets of data with other systems on the Internet. It is a network configuration used for establishing a PPP connection over an Ethernet protocol. It is commonly used for creating DSL Internet connections. It is a networking standard for connecting to virtual private networks, or VPNs. It is an alternative to the simpler Basic Telecommunications Access Method (BTAM) communications access method, introducing built-in queuing. It is an obsolete computer networking protocol used by a host computer to request its Internet Protocol(Ipv4) address from an administrative host, when it has available its Link Layer or hardware address, such as a MAC address. It is a distance-vector routing protocol, which employs the hop count as a routing metric. It run procedures on other machines or devices connected to a network. Once the instructions have been run, the results of the procedure are usually returned to the local computer. is a Microsoft API and server software make it possible to create applications to administer the routing and remote access service capabilities of the operating system, to function as a network router, and developers can also use RRAS to implement routing protocols. It is used extensively in communication and entertainment

RTSP

Real Time Protocol

Streaming

SAN

Storage Area Network

SDLC

Synchronous Control

Data

Link

SMB

Server Message Block

SMTP SNA

Simple Mail Protocol Systems Architecture

Transfer Network

systems that involve streaming media, such as telephony, video teleconference applications, television services and web-based push-totalk features. It is a network control protocol designed for use in entertainment and communications systems to control streaming media servers. The protocol is used for establishing and controlling media sessions between end points. It is a network of storage devices that can be accessed by multiple computers. Each computer on the network can access hard drives in the SAN as if they were local disks connected directly to the computer. It is a computer communications protocol. SDLC supports multipoint links as well as error correction. It also runs under the assumption that an SNA header is present after the SDLC header. SDLC was mainly used by IBM mainframe and midrange systems; however, implementations exist on many platforms from many vendors. The use of SDLC (and SNA) is becoming more and more rare, mostly replaced by IP-based protocols or being tunneled through IP (using Any Net or other technologies). It is a network protocol used by Windows-based computers that allows systems within the same network to share files. This is the protocol used for sending email over the Internet. It is a complete protocol stack for interconnecting computers and their resources. SNA describes the protocol and is, in itself, not actually a program. The implementation of SNA takes the

SNMP SOAP

Simple Network Management Protocol Simple Object Access Protocol Service Set Identifier

SSID

SSL

Secure Sockets Layer

TCP/IP

Transmission Control Protocol/Internet Protocol

UDP

User Datagram Protocol

URL

Uniform Resource Locator

VoIP

Voice Over Protocol

Internet

VPI

Virtual Path Identifier

form of various communications packages, most notably Virtual telecommunications access method (VTAM) which is the mainframe package for SNA communications. It is used for exchanging management information between network devices. It is a method of transferring messages, or small amounts of information, over the Internet. It is a unique ID that consists of 32 characters and is used for naming wireless networks. It is a secure protocol developed for sending information securely over the Internet. The TCP part has to do with the verifying delivery of the packets. The IP part refers to the moving of data packets between nodes. It is part of the TCP/IP suite of protocols used for data transferring. UDP is a known as a stateless protocol, meaning it doesn t acknowledge that the packets being sent have been received. It is the address of a specific Web site or file on the Internet. It cannot have spaces or certain other characters and uses forward slashes to denote different directories. It is basically a telephone connection over the Internet. The data is sent digitally, using the Internet Protocol (IP) instead of analog telephone lines. It is an 8-bit header inside each ATM cell that indicates where the cell should be routed. ATM, or asynchronous transfer mode, is a method of sending data in small packets of fixed sizes. It is used by

VPN

VTAM

W3C

WAIS

WAN

WEP

Wi-Fi

many ISPs (Internet Service Providers) for transferring data to client computers. Virtual Private Network A VPN can scramble all the data sent through the wide area network, so the network is virtually private. Virtual It is IBM s software package that Telecommunications provides communications via Access Method telecommunication devices for mainframe environments. It is the implementation of Systems Network Architecture (SNA) for mainframes. VTAM provides an API for communications applications, and controls communications equipment such as communications adapters and communications controllers. In modern terminology, VTAM provides a communications stack and device drivers. World Wide Web This is an international community Consortium that includes a full-time staff, industry experts, and several member organizations. These groups work together to develop standards for the World Wide Web. Wide Area Information This is a program that can index Server enormous amounts of information and make it searchable across large networks (including the Internet). Wide Area Network It is similar to a Local Area Network (LAN), but it s a lot bigger. Unlike LANs, WANs are not limited to a single location. Wired Equivalent Privacy It adds security to a wireless network by encrypting the data. If the data is intercepted, it will be unrecognizable to system that intercepted the data, since it is encrypted. Wireless Fidelity Refers to wireless networking technology that allows computers and other devices to communicate over a wireless signal.

WiMAX

Worldwide Interoperability Microwave Access

WLAN

WPA

WWW XDM

XMP

Zeroconf

It is a communication technology for for wirelessly delivering high-speed Internet service to large geographical areas. Wire-less Local Area Also referred to as LAWN. A type of Network local-area network that uses highfrequency radio waves rather than wires to communicate between nodes. Wi-Fi Protected Access It is a security protocol designed to create secure wireless (Wi-Fi) networks. It is similar to the WEP protocol, but offers improvements in the way it handles security keys and the way users are authorized. World Wide Web It is the actual network of networks where all the information resides. X Window Display It runs as a program that allows the Manager starting of a session on an X server from the same or another computer. Extensible Messaging and It is an open-standard communications Presence Protocol protocol for message-oriented middleware based on XML Zero configuration It is a set of techniques that networking automatically creates a usable Internet Protocol (IP) network without manual operator intervention or special configuration servers. Zero configuration networking allows devices such as computers and printers to connect to a network automatically. Without zeroconf, a network administrator must set up services, such as Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS), or configure each computer's network settings manually, which may be difficult and time-consuming.

ZMA

Zone Multicast Address

It is data address

link independent

group within

the AppleTalk computer protocol suite at which a node the NBP broadcasts directed zone.

network network receives to its

You might also like