Top-Rated Free Essay
Preview

all apprivations of computer technology

Satisfactory Essays
3215 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
all apprivations of computer technology
BOOTP:Bootstrap Protocol•••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••13
DCAP: Data Link Switching Client Access Protocol••••••••••••••••••••••••••••••••••••14
DHCP: Dynamic Host Configuration Protocol•••••••••••••••••••••••••••••••••••••••••••15
DNS: Domain Name System (Service) Protocol••••••••••••••••••••••••••••••••••••••••16
FTP: File Transfer Protocol••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••17
Finger: User Information Protocol••••••••••••••••••••••••••••••••••••••••••••••••••••••••••19
HTTP: Hypertext Transfer Protocol••••••••••••••••••••••••••••••••••••••••••••••••••••••••20
S-HTTP: Secure Hypertext Transfer Protocol•••••••••••••••••••••••••••••••••••••••••••21
IMAP & IMAP4: Internet Message Access Protocol (version 4)•••••••••••••••••••••22
IRCP: Internet Relay Chat Protocol••••••••••••••••••••••••••••••••••••••••••••••••••••••••24
LDAP: Lightweight Directory Access Protocol (version 3)••••••••••••••••••••••••••••25
MIME (S-MIME): Multipurpose Internet Mail Extensions and Secure MIME••••••26
NAT: Network Address Translation•••••••••••••••••••••••••••••••••••••••••••••••••••••••••27
NNTP: Network News Transfer Protocol•••••••••••••••••••••••••••••••••••••••••••••••••28
NTP: Network Time Protocol••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••29
POP and POP3: Post Office Protocol (version 3)••••••••••••••••••••••••••••••••••••••31
Rlogin: Remote Login in UNIX Systems••••••••••••••••••••••••••••••••••••••••••••••••••32
RMON: Remote Monitoring MIBs (RMON1 and RMON2)••••••••••••••••••••••••••••33
II
Table of Contents
SLP: Service Location Protocol••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••35
SMTP: Simple Mail Transfer Protocol•••••••••••••••••••••••••••••••••••••••••••••••••••••36
SNMP: Simple Network Management Protocol•••••••••••••••••••••••••••••••••••••••••37
SNMPv1: Simple Network Management Protocol version one••••••••••••••••••••••38
SNMPv2: Simple Network Management Protocol version two••••••••••••••••••••••40
SNMPv3: Simple Network Management Protocol version three••••••••••••••••••••42
SNTP: Simple Network Time Protocol••••••••••••••••••••••••••••••••••••••••••••••••••••44
TELNET: Terminal Emulation Protocol of TCP/IP•••••••••••••••••••••••••••••••••••••••46
TFTP: Trivial File Transfer Protocol•••••••••••••••••••••••••••••••••••••••••••••••••••••••47
URL: Uniform Resource Locator•••••••••••••••••••••••••••••••••••••••••••••••••••••••••••48
Whois (and RWhois): Remote Directory Access Protocol••••••••••••••••••••••••••••49
X Window/X Protocol: X Window System Protocol••••••••••••••••••••••••••••••••••••50
Presentation Layer Protocols•••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••51
LPP: Lignhtweight Presentation Protocol••••••••••••••••••••••••••••••••••••••••••••••••••51
Session Layer Protocols•••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••52
RPC: Remote Procedure Call Protocol•••••••••••••••••••••••••••••••••••••••••••••••••••52
Transport Layer Protocols•••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••54
ITOT: ISO Transport Service on top of TCP•••••••••••••••••••••••••••••••••••••••••••••54
RDP: Reliable Data Protocol•••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••55
RUDP: Reliable User Datagram Protocol (Reliable UDP)••••••••••••••••••••••••••••57
TALI: Tekelec’s Transport Adapter Layer Interface•••••••••••••••••••••••••••••••••••••58
TCP: Transmission Control Protocol••••••••••••••••••••••••••••••••••••••••••••••••••••••59
UDP: User Datagram Protocol•••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••61
Van Jacobson: Compressed TCP Protocol••••••••••••••••••••••••••••••••••••••••••••••62
Network Layer Protocols•••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••63
Routing Protocols•••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••63
BGP (BGP-4): Border Gateway Protocol•••••••••••••••••••••••••••••••••••••••••••••••••63
III
Table of Contents
EGP: Exterior Gateway Protocol•••••••••••••••••••••••••••••••••••••••••••••••••••••••••••64
IP: Internet Protocol (IPv4)•••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••65
IPv6: Internet Protocol version 6••••••••••••••••••••••••••••••••••••••••••••••••••••••••••67
ICMP & ICMPv6: Internet Message Control Protocol and ICMP version 6•••••••68
IRDP: ICMP Router Discovery Protocol••••••••••••••••••••••••••••••••••••••••••••••••••69
Mobile IP: IP Mobility Support Protocol for IPv4 & IPv6••••••••••••••••••••••••••••••70
NARP: NBMA Address Resolution Protocol•••••••••••••••••••••••••••••••••••••••••••••72
NHRP: Next Hop Resolution Protocol•••••••••••••••••••••••••••••••••••••••••••••••••••••73
OSPF: Open Shortest Path Firest Protocol (version 2)•••••••••••••••••••••••••••••••••74
RIP: Routing Information Protocol (RIP2)•••••••••••••••••••••••••••••••••••••••••••••••75
RIPng: Routing Information Protocol next generation for IPv6••••••••••••••••••••••76
RSVP: Resource ReSerVation Protocol••••••••••••••••••••••••••••••••••••••••••••••••••77
VRRP: Virtual Router Redundancy Protocol••••••••••••••••••••••••••••••••••••••••••••78
Multicasting Protocols•••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••79
BGMP: Border Gateway Multicast Protocol••••••••••••••••••••••••••••••••••••••••••••••79
DVMRP: Distance Vector Multicast Routing Protocol••••••••••••••••••••••••••••••••••80
IGMP : Internet Group Management Protocol•••••••••••••••••••••••••••••••••••••••••••81
MARS: Multicast Address Resolution Server••••••••••••••••••••••••••••••••••••••••••••82
MBGP: Multiprotocol BGP••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••83
MOSPF: Multicast Extensions to OSPF•••••••••••••••••••••••••••••••••••••••••••••••••85
MSDP: Multicast Source Discovery Protocol••••••••••••••••••••••••••••••••••••••••••••87
MZAP: Multicast-Scope Zone Anncuncement Protocol•••••••••••••••••••••••••••••••88
PGM: Pragmatic General Multicast Protocol••••••••••••••••••••••••••••••••••••••••••••89
PIM-DM: Protocol Independent Multicast - Dense Mode••••••••••••••••••••••••••••90
PIM-SM: Protocol Independent Multicast - Sparse Mode••••••••••••••••••••••••••••••91
MPLS Protocols•••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••92
MPLS: Multiprotocol Label Switching•••••••••••••••••••••••••••••••••••••••••••••••••••••92
IV
Table of Contents
CR-LDP: Constraint-based LDP••••••••••••••••••••••••••••••••••••••••••••••••••••••••••94
LDP: Label Distribution Protocol•••••••••••••••••••••••••••••••••••••••••••••••••••••••••••95
RSVP-TE: Resource Reservation Protocol - Traffic Extension•••••••••••••••••••••96
Data Link Layer Protocols•••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••97
ARP and InARP: Address Resolution Protocol and Inverse ARP•••••••••••••••••••97
IPCP and IPv6CP: IP Control Protocol and IPv6 Control Protocol••••••••••••••••••98
RARP: Reverse Address Resolution Protocol•••••••••••••••••••••••••••••••••••••••••••99
SLIP: Serial Line IP•••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••100
Network Security Technologies and Protocols•••••••••••••••••••••••••••••••••••••••••••101
AAA Protocols•••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••103
Kerberos: Network Authentication Protocol••••••••••••••••••••••••••••••••••••••••••••103
RADIUS: Remote Authentication Dial in User Service•••••••••••••••••••••••••••••••104
SSH: Secure Shell Protocolsl•••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••105
Tunneling Protocols•••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••106
L2F: Layer 2 Forwarding Protocol••••••••••••••••••••••••••••••••••••••••••••••••••••••106
L2TP: Layer 2 Tunneling Protocol••••••••••••••••••••••••••••••••••••••••••••••••••••••107
PPTP: Point-to-Point Tunneling Protocol•••••••••••••••••••••••••••••••••••••••••••••••109
Secured Routing Protocols••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••110
DiffServ: Differentiated Service Architecture•••••••••••••••••••••••••••••••••••••••••••110
GRE: Generic Routing Encapsulation•••••••••••••••••••••••••••••••••••••••••••••••••••111
IPSec: Security Architecture for IP•••••••••••••••••••••••••••••••••••••••••••••••••••••••112
IPSec AH: IPsec Authentication Header•••••••••••••••••••••••••••••••••••••••••••••••••113
IPsec ESP: IPsec Encapsulating Security Payload•••••••••••••••••••••••••••••••••••114
IPsec IKE: Internet Key Exchange Protocol••••••••••••••••••••••••••••••••••••••••••••115
IPsec ISAKMP: Internet Security Association and Key Management Protocol•116
TLS: Transprot Layer Security Protocol•••••••••••••••••••••••••••••••••••••••••••••••••117
V
Table of Contents
OtherA
AAL ATM Adaptation Layer
AAL0 ATM Adaptation Layer Type 0 refers to raw ATM cells.
AAL1 ATM Adaptation Layer Type 1 supports constant bit rate, time dependent traffic such as voice and video.
AAL2 ATM Adaptation Layer Type 2 reserved for variable bit rate video transfer.
AAL3/4 ATM Adaptation Layer Type 3/4 supports variable bit rate, delay tolerant data traffic requiring some sequencing and/or error detection support.
AAL5 ATM Adaptation Layer Type 5 supports variable bit rate, delay tolerant connection oriented data traffic requiring minimal sequencing or error detection support.
AARP AppleTalk Address Resolution Protocol
ADSP AppleTalk Data Stream Protocol
AEP AppleTalk Echo Protocol
AFP AppleTalk Filing Protocol
ARP/RARP Address Resolution Protocol / Reverse Address Resolution Protocol
ASP AppleTalk Session Protocol
ATCP AppleTalk Control Protocol
ATM Asynchronous Transfer Mode
ATP AppleTalk Transaction Protocol B
BACP Bandwidth Allocation Control Protocol (PPP suite)
BAP Bandwidth Allocation Protocol (PPP suite)
BCAST Broadcast Protocol (Novell protocols)
BCC Broadcast Call Control
BCP Bridging Control Protocol (PPP suite)
BGP4 Border Gateway Protocol (TCP/IP)
BICI BISDN Inter Carrier Interface (ATM PNNI Signaling)
BMP (Burst) Burst Mode Protocol (Novell protocols)
BPDU Bridge Protocol Data Unit
BRE Bridge Relay Encapsulation, proprietary Ascom Timeplex protocol that extends bridging across WAN links by means of encapsulation (Frame Relay).
BVCP PPP Banyan VINES Control Protocol (PPP suite) C
CCITT International Telegraph and Telephone Consultative Committee (after the French)
CCP Compression Control Protocol (PPP suite)
CHAP Challenge Handshake Authentication Protocol (PPP suite)
CIF Cells in Frames (ATM over LAN)
COPS Common Open Policy Service
CTERM Command Terminal (DECnet) D
DAP Data Access Protocol (DECnet)
DCAP Data Link Switching Client Access Protocol
DCP Data Compression Protocol over Frame Relay
DCPCP DCP Control Protocol
DDP Datagram Delivery Protocol (AppleTalk)
DECnet Digital Equipment Corporation protocols developed to communicate between DEC minicomputers.
DHCP Dynamic Host Configuration Protocol (TCP/IP)
DIAG Diagnostic Responder protocol (Novell)
DLSw Data Link Switching (IBM SNA)
DNCP PPP DECnet Phase IV Control Protocol (PPP suite)
DNS Domain Name Server protocol (TCP/IP)
DSMCC Digital Storage Media Command and Control (Audio Visual over ATM)
DVB Digital Video Broadcasting E
ECP Encryption Control Protocol (PPP suite)
ESIS End system to Intermediate System protocol (ISO protocols)
Ethernet LAN protocol synonymous with IEEE 802.3 standard F
FANAP Flow Attribute Notification Protocol
FDDI Fiber Distributed Data Interface, standardized by ANSI
FTP File Transfer Protocol (TCP/IP)
FUNI Framebased UNI (User Network Interface) G
GCC Group Call Control
GMM GPRS Mobility Management
GSM GPRS Session Management
GSMP General Switch Management Protocol (IP Switching)
GTP GPRS Tunnelling Protocol H
HDLC High Level Data Link Control protocol developed by ISO, based on pioneering work by IBM on SDLC.
HPRAPPN High Performance Routing Advanced Peer to Peer Network, IBM network architecture for dynamic routing across arbitrary network topologies.
HTTP Hypertext Transfer Protocol (TCP/IP) I
ICMP Internet Control Message Protocol (TCP/IP)
ICMPv6 revision of ICMP (TCP/IP)
ICP Internet Control Protocol (Banyan)
IDP Internet Datagram Protocol (XNS)
IFMP Ipsilon Flow Management Protocol (IP Switching)
IGMP Internet Group Management Protocol (TCP/IP)
IGRP Interior Gateway Routing Protocol (TCP/IP)
IISP Interim Interswitch Signalling Protocol (ATM Signalling)
ILMI Interim Local Management Interface, bidirection exchange of management information between UMEs.
IP Internet Protocol, routing layer datagram service of the TCP/IP suite.
IPC InterProcess Communications protocol, datagram and reliable message delivery service for Banyan.
IPCP IP Control Protocol, responsible for configuring the IP parameters on both ends of the PPP link.
IPHC IP Header Compression
IPv6 revised version of IP (TCP/IP)
IPv6CP IPv6 PPP Control Protocol, responsible for configuring, enabling and disabling the IPv6 protocol modules on both ends of a PPP link.
IPX Internetwork Packet Exchange, Novell's implementation of the Xerox Internet Datagram Protocol (IDP).
IPXCP IPX PPP Control Protocol, choose and configure the IPX networklayer protocol over PPP.
ISDN Integrated Services Digital Network, all digital communications line that allows for transmission of voice, data, video and graphics, at very high speeds, over standard communication lines.
ISIS (ISO 10589) Intermediate System to Intermediate System, exchage of configuration and routing information to facilitate the operation of the routing and relaying functions of the network layer (ISO).
ISO International Standards Organization protocols defined by IEEE; complete sevenlayer protocol conforming to the OSI networking model.
ISOIP ISO Internetworking Protocol, includes builtin error signalling to aid in routing management.
ISOSP ISO Session Protocol, specifies procedures for a single protocol for the transfer of data and control information from one session entity to a peer session entity.
ISOTP (ISO 8073) ISO Transport Protocol
ISUP ISDN User Part of SS7, defines protocol and procedures used to seup, manage and release trunk circuits that carry voice and data calls over the public switched telephone network.
ITU Q.2931 Signalling International Telecommunications Union signalling standard for ATM to support Switched Virtual Connections. This is the signalling standard for ISDN. L
L2F Layer 2 Forwarding protocol, permits the tunneling of the link layer of higher layer protocols (PPP suite).
L2TP Layer 2 Tunneling Protocol, used for integrating multiprotocol dialup services into existing ISP POP.
LAPB Link Access Protocol, Balanced, derived from HDLC and used to carry X.25 packets.
LAPD Link Access Protocol, Channel D, layer 2 protocol defined in CCITT.
LAPF Link Access Procedure F (Frame Relay), modified LAPD standard for Frame Relay.
LAT Local Area Transport protocol, designed to handle multiplexed terminal traffic to/from timesharing hosts (DECnet).
LAVC Local Area VAX Cluster protocol, communications between DEC VAX computers in a cluster (DECnet).
LDAP Lightweight Directory Access Protocol
LDP Label Distribution Protocol
LCP Link Control Protocol, establishes, configures and tests the data link connection (PPP suite).
LLC Logical Link Control protocol (IEEE 802.2), provides a link mechanism for upper layer protocols.
LQR Link Quality Report, specifies the mechanism for link quality monitoring with PPP. M
M2UA used for backhauling of SS7 MTP2-User signalling messages over IP using Stream Control Transmission Protocol (SCTP)
M3UA supports transport of SS7 MTP3-User sugnalling over IP using Stream Control Transmission Protocol (SCTP)
MAPOS Multiple Access Protocol over SONET / SDH
MARS Multicast Address Resolution Server (TCP/IP)
Megaco Media Gateway Control
MLP Multilink Procedure, added upper sublayer of the LAPB, operating between the packet layer and a multiplicity of single data link protocol functions (SLPs) in the data link layer (X.25).
MOP Maintenance Operation Protocol, utility services such as uploading and downloading system software, remote testing and problem diagnosis (DECnet).
MOUNT protocol used to initiate client access to a server supporting NFS.
MPEG Motion Picture Experts Group, ISO standards group dealing with video and audio compression.
MPLS Multi Protocol Label Switching, set of procedures for augmenting network layer packets with "label stacks", thereby turning them into labeled packets.
MPOA Multi Protocol Over ATM, deals with efficient transfer of innersubnet unicast data in a LAN emulation environment.
MPPC Microsoft PointtoPoint Compression Protocol
MTP2 Message Transfer Part, Level 2, signalling link which together with MTP3 provides reliable transfer of signalling messages between two directly connected signalling points (SS7).
MTP3 Message Transfer Part, Level 3, connects Q.SAAL to the users (SS7 suite). N
NBFCP PPP NetBIOS Frames Control Protocol, network control protocol responsible for establishing and configuring the NBF protocol over PPP.
NBP AppleTalk Name Binding Protocol, manages the use of names on AppleTalk networks.
NBMA NonBroadcast, MultiAccess.
NCP Novell NetWare Core Protocol, manages access to the primary NetWare server resources.
NDS NetWare Directory Services (Novell), globally distributed network database that replaces the bindery used in previous versions of NetWare.
NetRPC NetRemote Procedure Call, used to access VINES applications such as StreetTalk and VINES Mail (Banyan).
NFS Sun Network File System, file sharing application for the Sun protocol suite.
NHDR Network Layer Header, begins the frame used by RTP nodes.
NHRP NBMA Next Hop Resolution Protocol.
NSP Network Services Protocol, provides reliable virtual connection services with flow control to the network layer Routing Protocol (DECnet).
NTP Network Time Protocol, time synchronization system for computer clocks through the Internet network (TCP/IP). O
OSINLCP OSI Network Layer Control Protocol, responsible for configuring, enabling and disabling the OSI protocol modules on both ends of the PPP link.
OSPF Open Shortest Path First, linkstate routing protocol used for routing IP (TCP/IP). P
PAP Printer Access Protocol, manages the virtual connection to printers and other servers (AppleTalk).
PAP Password Authentication Protocol, provides a simple method for the peer to establish its identity using a 2way handshake (PPP suite).
PEP Packet Exchange Protocol, provides a semireliable packet delivery service that orients towards singlepacket exchanges (XNS).
PIM Protocol Independent MulticastSparse Mode (PIMSM)
PMAP Port Mapper protocol, manages the allocation of transport layer ports to network server applications (Sun).
PNNI Private NetworktoNetwork Interface, hierarchial, dynamic linkstate routing protocol (ATM).
POP3 Post Office Protocol version 3, permits workstations to dynamically access a maildrop on a server host (TCP/IP).
PP ISO Presentation Protocol, performs context negotiation and management between open systems.
PPP PointtoPoint Protocol, designed for simple links which transport packets between two peers.
PPP Multilink Multilink PointtoPoint Protocol, permits a system to indicate to its peer that it is capable of combining multiple physical links into a "bundle".
PPPBPDU PPP Bridge Protocol Data Unit, used to connect remote bridges.
PPTP PointtoPoint Tunneling Protocol, allows PPP to be channeled through an IP network (PPP). Q
QLLC Qualified Logical Link Control protocol, transfers IBM SNA data over an X.25 network. R
RANAP - Radio Access Network Application Part is the Radio Netwok Layer sugnalling protocol for the Iu interface.
RIP Routing Information Protocol, maintains a database of network hosts and exchange information about the topology of the network (XNS).
RIP2 Routing Information Protocol, used by Berkeley 4BSD UNIX systems to exchange routing information. RIP2 derives from the Xerox protocol of the same name (TCP/IP).
RIPX Routing Information Protocol, used to collect, maintain and exchange correct routing information among gateways within the Internet (Novell).
RFC Request for Comments, a series of notes about the Internet, started in 1969 (when the Internet was the ARPANET). The notes discuss many aspects of computing and computer communication focusing in networking protocols, procedures, programs, and concepts, but also including meeting notes, opinion, and sometimes humor. The specification documents of the Internet protocol suite, as defined by the Internet Engineering Task Force (IETF) and its steering group (the IESG), are published as RFCs. Many of the TCP/IP protocols and PPP protocols are defined by rfc's.
RLOGIN Remote Login, allows UNIX users of one machine to connect to other UNIX systems across the Internet and interact as if their terminals are directly connected to the machines (TCP/IP).
RLP Radio Link Protocol
RM Cells Rate Management cells (ATM cells).
RND name of a company which uses a proprietary protocol header (RND) to transfer LAN protocols via WAN.
RP Routing Protocol, distributes routing information among DECnet hosts.
RPC Remote Procedure Call protocol, activates a function on a remote station and retrieves the result (Sun).
RSVP Resource ReSerVation setup Protocol, designed for an integrated services Internet (TCP/IP).
RTMP Routing Table Maintenance Protocol, manages routing information for AppleTalk networks.
RTP Routing Update Protocol, used to distribute network topology (Banyan).
RUDP Reliable UDP
RVP Remote Voice Protocol S
SAP Novell's Service Advertising Protocol, provides information about what servers are available on the network.
SCCP Signalling Connection Control Part, offers enhancements to MTP level 3 to provide connectionless and connectionoriented network services, as well as to address translation capabilities (SS7).
SCP Session Control Protocol, manages logical links for DECnet connections.
SCSP is a routine protocol in the TCP/IP family.
SCTP Stream Control Transmission Protocol
SDP Session Description Protocol
SDCP PPP Serial Data Control Protocol, responsible for configuring, enabling and disabling the SDTP modules on both ends of the pointtopoint link.
SDLC Synchronous Data Link Control protocol, developed by IBM to be used as the layer 2 of the SNA hierarchical network.
SER Serialization packet, ensures that a single version of NetWare is not being loaded on multiple servers.
SIP SMDS Interface Protocol, threelevel protocol that controls access to the network.
SIP (VoIP) Session Initiation Protocol
SLP Servise Location Protocol
SMB Server Message Block, Microsoft presentation layer protocol providing file and print sharing functions for LAN Manager, Banyan VINES and other networking operating systems.
SMDS Switched Multimegabit Data Service, broadband networking technology developed by Bellcore.
SMPP Short Message Peer to Peer
SMTP Simple Mail Transfer Protocol, mail service modeled on the FTP file transfer service (TCP/IP).
SMS Short Message Service (UMTS).
SMS Short Message Service.
SNA Systems Network Architecture, introduced by IBM to provide a framework for joining together many mutually incompatible IBM products for distributed processing.
SNACP SNA PPP Control Protocol, responsible for configuring, enabling and disabling SNA on both ends of the pointpoint link (PPP).
SNMP Simple Network Management Protocol, developed by the Internet community to allow diverse network objects to participate in a global network management architecture.
SOCKS
SPANS Simple Protocol for ATM Network Signalling, developed by FORE Systems for use in ATM networks.
SPP Sequenced Packet Protocol, provides a reliable virtual connection service for private connections (Banyan).
SPP Sequenced Packet Protocol, provides reliable transport delivery with flow control (XNS).
SPX Sequential Packet Exchange, Novell's version of Xerox SPP. It is a transport layer protocol providing a packet delivery service for third party applications.
SRB Source Routing Bridging, proprietary header of Bay Networks which passes Token Ring information over WAN lines.
SRP Spatial Reuse Protocol.
SS7 Signalling System 7, a common channel signalling system.
STP Spanning Tree Protocol, prevents the formation of logical looping in the network (DECnet). T
TALI Transport Adapter Layer Interface
TCAP Transaction Capabilities Application Part, enables the deployment of advanced intelligent network services by supporting noncircuit related information exchange between signalling points using the SCCP connectionless service (SS7).
TCP Transmission Control Protocol, provides a reliable stream delivery and virtual connection service to applications through the use of sequenced acknowledgement with retransmission of packets when necessary (TCP/IP).
TDP Tag Distribution Protocol, a two party protocol that runs over a connection oriented transport layer with guaranteed sequential delivery.
TELNET Terminal emulation protocol of TCP/IP.
TFTP Trivial File Transfer Protocol, supports file writing and reading (TCP/IP).
THDR Transport Layer Header, used by RTP endpoints to provide correct processing of the packet (SNA).
Timeplex (BRE2) Bridge Relay Encapsulation, proprietary Ascom Timeplex protocol that extends bridging across WAN links by means of encapsulation (Frame Relay).
Token Ring LAN protocol where all stations are connected in a ring and each station can directly hear transmissions only from its immediate neighbor. U
UDP User Datagram Protocol, provides a simple but unreliable message service for transactionoriented services (TCP/IP).
UMTS
UNI User Network Interface, an interface point between ATM end users and a private ATM switch, or between a private ATM switch and the public carrier ATM network.
V
Van Jacobson compressed TCP protocol which improves the TCP/IP performance over low speed serial links.
VARP VINES Address Resolution Protocol, used for finding the node Data Link Control address from the node IP address (Banyan).
VCI Virtual Channel Identifier.
VGCS Voice Group Call Service
ViVID MPOA proprietary protocol of Newbridge which provides bridged LAN Emulation and routed LAN Emulation functionality.
VPI Virtual Path Identifier
VRRP Virtual Router Redundancy Protocol W
WAE Wireless Application Environment
WAP Wireless Application Protocol
WCCP Web Cache Coordination Protocol
WDOG Watchdog protocol, provides constant validation of active workstation connections and notifies the NetWare operating system when a connection may be terminated as a result of lengthy periods without communication (Novell).
Wellfleet BOFL Wellfleet Breath of Life, used as a line sensing protocol.
Wellfleet SRB Source Routing Bridging, proprietary header of Bay Networks which passes Token Ring information over WAN lines.
WML
WSP Wireless Session Protocol
WTLS Wireless Transport Layer Security
WTP Wireless Transaction Protocol X
X.25 CCITT's recommendation for the interface between a DTE and DCE over a PSTN.
X.75 Signalling system which is used to connect packet switched networks (such as X.25) on international circuits.
XNS Xerox Network System protocols, provide routing capability and support for both sequenced and connectionless packet delivery.
XOT Cisco Systems' X.25 over TCP. Y
YP (NIS) Sun Yellow Pages protocol, known now as Network Information Service, is a directory service used for name lookup and general table enumeration. Z
ZIP AppleTalk Zone Information Protocol, manages the relationship between network numbers and zone names.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT1310 Unit 3 Exercise 1

    • 443 Words
    • 2 Pages

    Application (in terms of cabling infrastructure) – systems supported by telecommunications cabling; includes Ethernet, Token ring, Fiber Distributed Data Interface (FDDI), and Asynchronous Transfer Mode (ATM)…

    • 443 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    NT1210Unit3Lab3

    • 1288 Words
    • 4 Pages

    Exercise 3.3.3 The most common protocols used from this suite are IP, TCP, and UDP. Briefly describe the purpose and functions of each of these.…

    • 1288 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    TCP / IP Model - provides end-to-end connectivity specifying how data should be formatted, addressed, transmitted, routed and received at the destination. This functionality has been organized into four abstraction layers which are used to sort all related protocols according to the scope of networking involved.[1][2] From lowest to highest, the layers are the link layer, containing communication technologies for a single network segment (link), the internet layer, connecting hosts across independent networks, thus establishing internetworking.…

    • 559 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    • You have approximately 25 hours in which to complete this scenario. • Before starting work on the problem, read the whole of this Candidate Booklet thoroughly. You can…

    • 1453 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Computer technology during the 70's 80's and 90's Computer technology took a great leap in development during the 70's when schools, businesses, and universities began to use computers. The 70's would have to be the beginning of the technology of computers, as we know it today. The personal computer became big in the 80's. Now computers are being updated daily, if not hourly.…

    • 759 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Information Techology

    • 327 Words
    • 2 Pages

    I have chosen Business Planning and Development and Investment Strategy. Before a company can being any project they would have to create a plan and have a strong strategy before any developing a financial plan which is based on the development of a vital investment strategy. The company would have to present a strong financial plan base on the investment strategy to present to any potential investor and making sure they are comfortable with all aspects of the company’s business and financial plan. The IT strategies together or very important for the development of a new economic development plan. I was reading an new article on the federal government conducting an audit on all new IT project budgets and found all over spend their budget by 30 percent which is becoming a great financial issue for control contracted IT projects. I believe these two strategies are a must and complement each other and can not function without having each other existing.…

    • 327 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    asteroid was on a line with Earth, the computer would show us and enable us…

    • 1774 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    to keep computer running for a period of time after a power failure 9 1…

    • 2022 Words
    • 9 Pages
    Satisfactory Essays
  • Satisfactory Essays

    W hat yo u w il l n e ed t o c o mp l et e t h e P AT ? ...................................................................................... 7…

    • 13264 Words
    • 54 Pages
    Satisfactory Essays
  • Powerful Essays

    Objectives: To visualize molecules in 3-dimensions. To learn how to use the Spartan ES software. To compute and graph the relative conformational energies of ethane and butane.…

    • 3904 Words
    • 16 Pages
    Powerful Essays
  • Satisfactory Essays

    Chapter 2 REVIEW OF RELATED STUDIES Related Studies Local Studies Based on the previous research, the computer has also disadvantages aside from the fact that it provides the students information’s and other features. In that research they conclude many students spent more time playing rather...…

    • 111 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Computer & Engineering

    • 2008 Words
    • 9 Pages

    Reading, writing, arithmetic, speaking, and listening are all considered basic skills. These skills are useful over a wide range of problems that people encounter. Now use of computer-based personal productivity tools is emerging as a new standard in education. My own skills improved and still growing with that strange hit and pick the keys of keyboard and the big different way to writing and do our thing without pencil or pen if I wont to draw my sketch ( Because I’m production engineer and how can make a report or set workers as list to describe the way to product. But I wont to set specific way and the main benefits from changing from pen to computer hit at key and I think it is the time for future systematic way to discuss our self by computerize way or systematic by set points and discuss productivity tools :…

    • 2008 Words
    • 9 Pages
    Better Essays
  • Powerful Essays

    Computer Technology

    • 1927 Words
    • 8 Pages

    2 You work for a company called Hothouse Design. You are going to perform some clerical tasks for this company. 1 Open the file JX1EVIDENCE.RTF Make sure that your name, Centre number and candidate number will appear on every page of this document. Save this evidence document in your work area as JX1EVIDENCE followed by your candidate number. For example: JX1EVIDENCE9999 You will need this file later. 2 Add Farid@cie.org.uk to your email contacts/address book with the name Project Manager Show evidence of this in your evidence document. (This may be a screenshot.) You will send a message to this address later. You are now going to edit a document about the development of a new port. 3 4 5 6 7 8 Using a suitable software package, load the file JX1PORT21.RTF Set the page size to A4. Set the…

    • 1927 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    advancement of computer

    • 394 Words
    • 2 Pages

    Julie Anne San Jose — I'll Be There lyrics First time I laid my eyes on someone like you I can't forget the hour, that moment with you Then I have realized, love is growing deep inside…

    • 394 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Computer Applications

    • 572 Words
    • 3 Pages

    E-signature software enables you to sign documents online. Pioneered by RightSignature™, this popular technology is becoming a valued business tool in virtually every industry.…

    • 572 Words
    • 3 Pages
    Good Essays