ATM (Asynchronous
Transfer Mode)
Authentication and Authorization
Backup and Data Archiving
Bandwidth Management
Cable and Wiring
Cable (CATV) Data Networks
Cache and Caching Techniques
Certificates and Certification Systems
Client/Server Computing
Collaborative Computing
Communication Services and Providers
Congestion Control Mechanisms
Cryptography
Data Communication Concepts
Data Warehousing
Data Link Protocols
Datagram and Datagram Services
Delay, Latency, and Jitter
Disaster Planning and Recovery
Distributed Computer Networks
Distributed Object Computing
Electronic Commerce
Embedded Systems
Ethernet
Fault Tolerance and High Availability
File Sharing
File Systems
Flow-Control Mechanisms
Gigabit Ethernet
Hypermedia and Hypertext
Instant Messaging
Internet
Internet Architecture and Backbone
Internet Connections
Internet Entertainment
Internet Organizations and Committees
Internet Protocol Suite
Internet Standards
Intranets and Extranets
IP over ATM
Java
Label Switching
LAN (Local Area Network)
Link Aggregation
Load Balancing
MAN (Metropolitan Area Network)
Metadata
|
Middleware
and Messaging
Mobile Computing
Multimedia
Multiprocessing
Multitiered Architectures
Network Access Services
Network Architecture
Network Concepts
Network Connection Technologies
Network Core Technologies
Network Design and Construction
Network Layer Protocols
Network Management
Network Operating Systems
Object Technologies
Optical Networks
Packets and Packet-Switching Networks
Policy-Based Management
Prioritization of Network Traffic
QoS (Quality of Service)
Queuing
Remote Access
Replication
Repository
Routing
Routing on the Internet
SANs (Storage Area Networks)
Search and Discovery Services
Security
Serial Communication and Interfaces
Service Advertising and Discovery
Signals
Standards Groups, Associations, and Organizations
Storage Systems
Switch Fabrics and Bus Design
Switching and Switched Networks
TCP (Transmission Control Protocol)
Telecommunications and Telephone Systems
Videoconferencing
Voice/Data Networks
VPN (Virtual Private Network)
Web Technologies and Concepts
Wireless Communications
Workflow Management
XML (Extensible Markup Language)
|
10/100/1000Base-T
6Bone and IPv6
802 Standards, IEEE
A
Abilene 6Bone and IPv6
ABONE (Active Backbone)
Access Control
Access Method, Network
Access Provider
Access Rights
Account, User
Accounting on the Internet
Accounting Services
ACID (Atomicity, Consistency, Isolation, Durability)
Acknowledgments
ACL (Access Control List)
Acrobat
Active Directory
Active Documents
Active Networks
Active Server Page
ActiveX
Adapter
ADC (Analog-to-Digital Conversion)
ADCCP (Advanced Data Communications Control Procedure)
Address Resolution Protocol
Addresses, Electronic Mail
Addresses, Network
ADM (Add-Drop Multiplexers)
Administrator Account
Admission Control
ADPCM (Adaptive Differential Pulse Code Modulation)
ADSL (Asymmetrical Digital Subscriber Line)
ADTM (Asynchronous Time Division Multiplexing)
Advanced Intelligent Network
Advertising and Advertising Services
AFP (AppleTalk Filing Protocol)
AFS (Andrew File System)
Agent, Internet
Agent, Network Management
Aggregate Route-Based IP Switching
Aggregation of Links
Aggregation, Routing
AIN (Advanced Intelligent Network)
ALB (Adaptive Load Balancing)
ALOHA
AMPS (Advanced Mobile Phone Service)
Analog Transmission Systems
Andrew File System
Anonymous (Guest) Access
ANSI (American National Standards Institute)
Antivirus Software
Anycasting
AnyNet
Apache
API (Application Programming Interface)
APPC (Advanced Program-to-Program Communications)
Apple Computer
Apple Open Transport Protocol
AppleShare
AppleTalk
Application Layer, OSI Model
Application Server
Application-Level Gateway
Applications, Networks
APPN (Advanced Peer-to-Peer Networking)
Archiving of Data
ARCNET
ARDIS (Advanced National Radio Data Service)
ARIN (American Registry for Internet Numbers)
ARIS (Aggregate Route-based IP Switching)
ARP (Address Resolution Protocol)
ARPANET (Advanced Research Projects Agency Network)
ASIC (Application-Specific Integrated Circuit)
ASP (Application Service Provider)
Associations
Asymmetrical Multiprocessing
Asynchronous Communications
AT&T
ATM (Asynchronous Transfer Mode)
Attacks and Attackers
Attenuation
Attributes
Auditing
Authentication and Authorization
Authenticode, Microsoft
Autonomous System
Availability
AWG (American Wire Gauge)
B
Baby Bells
Backbone Networks
Back-End Systems
Backplane Architecture
Backup and Data Archiving
BACP (Bandwidth Allocation Control Protocol)
Bandwidth
Bandwidth Brokerage
Bandwidth Management
Bandwidth on Demand
Bandwidth Reservation
Banyan VINES
BAP (Bandwidth Allocation Protocol) and BACP (Bandwidth Allocation
Control
Protocol)
Baseband Network
Bastion Host
Baud
Beans
Bell Modem Standards
Bell Operating Companies
Bellman-Ford Distance-Vector Routing Algorithm
Benchmarking
BeOS
Best-Effort Delivery
BGP (Border Gateway Protocol)
Bindery
Biometric Access Devices
B-ISDN (Broadband ISDN)
BISYNC (Binary Synchronous Communications)
Bit-Oriented Protocol
Block Suballocation
Block Transmission
Bluetooth
Bonding
BOOTP (BOOTstrap Protocol)
Bootstrapping or Booting
Bots
Breakout Box
BRI (Basic Rate Interface)
Bridges and Bridging
Broadband Communications and Networking
Broadcast
Broadcast Address
Broadcast Domain
Broadcast Networking
Broadcast Storm
Broadcasting on the Internet
Brouter (Bridge/Router)
Browsers, Web
Burst and Bursty Traffic
Bus Architectures
Bus Topology
Byte-Oriented Protocol
C
C2 Security Rating
Cable (CATV) Data Networks
Cable and Wiring
Cache and Caching Techniques
Call Center Operations
Campus Network
Capacity
Capacity Planning
CAPs (Competitive Access Providers)
Capstone
CardBus
Carrier Signal
Carriers and Carrier Services
CBQ (Class-Based Queuing)
CCITT (Consultative Committee for International Telephony and Telegraphy)
CDDI (Copper Distributed Data Interface)
CDE (Common Desktop Environment)
CDMA (Code Division Multiple Access)
CDPD (Cellular Digital Packet Data)
CDSA (Common Data Security Architecture)
CEBus (Consumer Electronic Bus)
Cells and Cell Relay
Cellular Communication Systems
Central Office
Centrex (CENTRal Exchange)
CERN
CERN Proxy Services
CERT (Computer Emergency Response Team)
Certificates and Certification Systems
CGI (Common Gateway Interface)
Challenge/Response Protocol
Channel
Channel Banks
CHAP (Challenge Handshake Authentication Protocol)
Chat
CICS, IBM
CIDR (Classless Inter-Domain Routing)
CIFS (Common Internet File System Protocol)
CIM (Common Information Model)
CIP (Classical IP Over ATM)
CIP (Common Indexing Protocol)
CIR (Committed Information Rate)
Circuit
Circuit Relay Firewall
Circuit-Switching Services
CISC (Complex Instruction Set Computer)
CIX (Commercial Internet eXchange) Association
Class of Service
CLEC (Competitive Local Exchange Carriers)
Client
Client/Server Computing
CLNP (Connectionless Network Protocol)
Cluster Controllers
Clustering
CMIP (Common Management Information Protocol)
CNRP (Common Name Resolution Protocol)
CO (Central Office)
Coaxial Cable Media
Collaborative Computing
Collisions and Collision Domains
Colocation Services
COM (Component Object Model)
Commercial Building Wiring Standard
Communication
Communication Controller
Communication Server
Communication Services and Providers
CompactPCI
Component Software Technology
Compound Documents
Compression Techniques
Computer-Telephony Integration
Concentrator Devices
Conferencing
Configuration Management
Congestion Control Mechanisms
Connection Establishment
Connection Technologies
Connection-Oriented and Connectionless Services
Constraint-Based Routing
Container
Container Objects, Directory Services
Content Distribution
Contention
Convergence
Convergence of Routing Tables
Cookies
Copper Distributed Data Interface
COPS (Common Open Policy Service)
CORBA (Common Object Request Broker Architecture)
Core Network
CoS (Class of Service)
CPCP (Coffee Pot Control Protocol)
CPE (Customer Premises Equipment)
CPI-C (Common Programming Interface for Communication), IBM
CPL (Call Processing Language)
Cryptography
CSMA/CD (Carrier Sense Multiple Access/Collision Detection)
CSR (Cell Switched Router), Toshiba
CSU/DSU (Channel Service Unit/Data Service Unit)
CTI (Computer-Telephony Integration)
Customer Premises Equipment
Cut-Through Architecture
Cut-Through Routing
Cyclic Redundancy Check
D
DAC (Discretionary Access Control)
Daemon
DAFS (Direct Access File System)
DARPA (Defense Advanced Research Projects Agency)
Data Broadcasting
Data Center Design
Data Communication Concepts
Data Compression
Data Encoding
Data Encryption
Data Link Layer, OSI Model
Data Link Protocols
Data Management
Data Mart
Data Migration
Data Mining
Data Protection
Data Striping
Data Switches
Data Transfer Rates
Data Transmissions
Data Warehousing
Database
Datagram and Datagram Services
DAV (Distributed Authoring and Versioning)
DAVIC (Digital Audio Visual Council)
DB2, IBM
DBMS (Database Management System)
DBS (Direct Broadcast Satellite)
DCE (Data Circuit-Terminating Equipment)
DCE (Distributed Computing Environment)
DCOM (Distributed Component Object Model)
DDE (Dynamic Data Exchange)
DDR (Dial-on-Demand Routing)
DECnet
Dedicated Circuits
Delay, Latency, and Jitter
DEN (Directory Enabled Networks)
Denial of Service Attack
DES (Data Encryption Standard)
Dfs (Distributed File System), Microsoft
DFS (Distributed File System), The Open Group
DHCP (Dynamic Host Configuration Protocol)
DHTML (Dynamic HTML)
Diagnostic Testing Equipment
Dial-Up Line
DIAMETER
Differentiated Services (Diff-Serv)
Diffie-Hellman
Diff-Serv (Differentiated Services)
Digest Algorithm
Digital Signal (DS) Standards
Digital Signatures
Digitize
Dijkstra Algorithm
Directory Attributes and Management
Directory Services
Disaster Planning and Recovery
Discovery Services
Discretionary Access Control
Disk Storage Systems
Diskless Workstations
Distance-Vector Routing
Distributed Applications
Distributed Computer Networks
Distributed Database
Distributed File Systems
Distributed Object Computing
DLC (Data Link Control)
DLC (Digital Loop Carrier)
DLSw (Data Link Switching)
DMI (Distributed Management Interface)
DMTF (Distributed Management Task Force)
DNA (Digital interNet Application)
DNS (Domain Name Service) and Internet Domains
DOCSIS (Data Over Cable Service Interface Specification)
Document Management
DOM (Document Object Model)
Domains, Internet
Domains, Windows NT
Downsizing
DPT (Dynamic Packet Transport)
DRDA (Distributed Relational Database Architecture)
DSA (Digital Signature Algorithm)
DSL (Digital Subscriber Line)
DSP (Digital Signal Processing)
DSS (Digital Satellite System)
DSS (Digital Signature Standard)
DSU/CSU (Data Service Unit/Channel Service Unit)
DSx (Digital Signal-x)
DTE (Data Terminal Equipment)
DTM (Dynamic Synchronous Transfer Mode)
Dublin Core Metadata for Resource Discovery
DUN (Dial-Up Networking)
Duplexed Systems
DWDM (Dense Wavelength Division Multiplexing)
Dynamic Routing
E
E Carrier
EAP (Extensible Authentication Protocol)
E-Commerce
Edge Devices
EDI (Electronic Data Interchange)
EGPs (Exterior Gateway Protocols)
EIA (Electronic Industries Alliance)
EIA/TIA Structured Cabling Standards
EIP (Enterprise Information Portal)
ELAN (Emulated LAN), ATM
Electromagnetic Interference
Electromagnetic Spectrum
Electronic Commerce
Electronic Mail
Electronic Software Distribution and Licensing
E-mail
Embedded Systems
EMI (Electromagnetic Interference)
Emulated LAN
Encapsulation
Encryption
End Systems and End-to-End Connectivity
Enterprise Network
ENUM
ERP (Enterprise Resource Planning)
Error Detection and Correction
ESCON (Enterprise Systems Connection)
ES-IS (End System-to-Intermediate System) Routing
EtherLoop
Ethernet
EtherTalk
Explicit Routing
Express Forwarding
Exterior Routing
Extranet
F
Fabric, Switched
Failover
Fast EtherChannel
Fast Ethernet
Fast IP
Fault Management
Fault Tolerance and High Availability
FAX Servers and Network Faxing
FDDI (Fiber Distributed Data Interface)
FDM (Frequency Division Multiplexing)
Fiber to the Curb/Fiber to the Home
Fiberless Optical Networking
Fiber-Optic Cable
Fibre Channel
File and Directory Rights and Permissions
File Server
File Sharing
File Systems
File Transfer Protocols
Filtering
Find/Search
Finger
Firewall
FireWire
Flapping
Flow
Flow-Control Mechanisms
FORTEZZA
Forwarding
Fractional T1/Fractional T3
FRAD (Frame Relay Access Device)
Fragmentation and Reassembly
Frame
Frame Relay
Frame Switch
Framing in Data Transmissions
FreeSpace Optical Network
Front-End Processor
Front-End System
FTAM (File Transfer Access and Management)
FTP (File Transfer Protocol)
FTTH (Fiber to the Home)
Full-Duplex Transmissions
FutureShare, Apple
G
G Series ITU Recommendations
G.lite
Gateway
Gateway-to-Gateway Protocol
GBE (10-Gigabit Ethernet)
Gigabit Ethernet
GigaPOP
GII (Global Information Infrastructure)
Gopher
GPRS (General Packet Radio Service)
GPS (Global Positioning System)
Grid Environments
Grounding Problems
Groups
Groupware
GSM (Global System for Mobile Communications)
GSMP (General Switch Management Protocol)
GSN (Gigabyte System Networking)
Guided Media
H
H Series ITU Recommendations
H.100/H.110 Computer Telephony Bus Standard
H.323 Multimedia Conferencing Standard
Hacking and Hackers
HALO (High Altitude Long Operation)
Handle System
Handshake
Hash Functions
HDLC (High-Level Data Link Control)
HDML (Handheld Device Markup Language)
HDR (High Data Rate)
HDSL (High-Bit-Rate Digital Subscriber Line)
HFC (Hybrid Fiber/Coax)
High-Availability Systems
High-Speed/High-Performance Networking
HiperLAN (Higher-Performance Radio LAN)
HIPPI (High-Performance Parallel Interface)
HMAC (Hashed Message Authentication Code)
Home Networking
Hop
Host
Host Connectivity, IBM
HPR (High-Performance Routing), IBM
HSRP (Hot Standby Router Protocol)
HSSI (High-Speed Serial Interface)
HTCP (Hypertext Caching Protocol)
HTML (Hypertext Markup Language)
HTTP (Hypertext Transfer Protocol)
Hubs/Concentrators/MAUs
Hypermedia and Hypertext
I
I2O (Intelligent I/O)
IAB (Internet Architectural Board)
IADs (Integrated Access Devices)
IAHC (International Ad Hoc Committee)
IANA (Internet Assigned Number Authority)
IBM (International Business Machines)
IBM Host Connectivity
ICANN (Internet Corporation for Assigned Names and Numbers)
ICMP (Internet Control Message Protocol)
ICP (Internet Cache Protocol)
ICQ (I-Seek-You)
ICSA (International Computer Security Association)
ICW (Internet Call Waiting)
IDPR (Interdomain Policy Routing Protocol)
IEC (International Electrotechnical Commission)
IEEE (Institute of Electrical and Electronic Engineers)
IEEE 802 Standards
IESG (Internet Engineering Steering Group)IETF (Internet Engineering
Task Force)
IGMP (Internet Group Message Protocol)
IGP (Interior Gateway Protocol)
IGRP (Interior Gateway Routing Protocol)
IIOP (Internet Inter-ORB Protocol)
IISP (Interim Inter-switch Signaling Protocol)
IKE (Internet Key Exchange)
ILEC (Incumbent Local Exchange Carriers)
IMA (Inverse Multiplexing over ATM)
Imaging
IMAP (Internet Message Access Protocol)
IMP (Interface Message Processor)
IMT-2000 (International Mobile Communications-2000)
IN (Intelligent Network)
Incident Response
InfiniBand
Information Appliance
Information Warehouse
Information Warfare
Infrared Technologies
Instant Messaging
Integrated Access Devices
Integrated Services (Int-Serv)
Intelligent Network
IntelliMirror
Internet
Internet Appliances
Internet Architecture and Backbone
Internet Connections
Internet Entertainment
Internet Organizations and Committees
Internet Protocol Suite
Internet Radio
Internet Standards
Internet Telephony
Internet2
Internetworking
InterNIC (Internet Network Information Center)
Interoperability
Intranets and Extranets
Intrusion Detection Systems
Int-Serv (Integrated Services)
Inverse Multiplexing
IOS (Internetwork Operating System)
IOTP (Internet Open Trading Protocol)
IP (Internet Protocol)
IP over ATM
IP over SONET
IP Storage
IP Switching, Ipsilon (Nokia)
IP Telephony
IPC (Interprocess Communication)
IPMI (Intelligent Platform Management Interface)
IPP (Internet Printing Protocol)
IPPM (IP Performance Metrics)
IPSec (IP Security)
IPX/SPX (Internetwork Packet Exchange/Sequenced Packet Exchange)
IRC (Internet Relay Chat)
IRR (Internet Routing Registry)
ISDN (Integrated Services Digital Network)
IS-IS (Intermediate System-to-Intermediate System) Routing
ISO (International Organization for Standardization)
ISO/IEC-11801 Cabling Standards
ISOC (Internet Society)
Isochronous Services
isoEthernet
ISPs (Internet Service Providers)
ITU (International Telecommunications Union)
IXC (Interexchange Carrier)
J
JAIN
Java
Jigsaw
Jitter
Jukebox Optical Storage Devices
Jumbo Frames
K
Kerberos Authentication Protocol
Kernel
Key Distribution and Management
Key Encryption Methods
Key Telephone Systems
KeyNote Trust Management System
L
L2TP (Layer 2 Tunneling Protocol)
Label Switching
Lambda Circuits
LAN (Local Area Network)
LAN Drivers
LAN Emulation
LAN Management
LANE (LAN Emulation)
LAP (Link Access Procedure)
Last Mile Services
LATA (Local Access and Transport Area)
Latency
Layer 2/Layer 3/Layer 4 Switching
Layered Architecture
LDAP (Lightweight Directory Access Protocol)
LDP (Label Distribution Protocol)
Learning Bridges
Leased Line
LEC (LAN Emulation Client)
LEC (Local Exchange Carrier)
|
LECS (LAN Emulation Configuration Server)
Legacy Systems
LEO (Low Earth Orbit) Satellite
LES (LAN Emulation Server)
Licensing, Electronic
Line Conditioning
Link Aggregation
Link-State Routing
Linux
LISTSERV
LLC (Logical Link Control)
LMDS (Local Multipoint Distribution Service)
Load Balancing
Local Loop
Local Procedure Calls
LocalTalk
Login Scripts
Logons and Logon Accounts
Long-Distance Carriers
Lotus Domino
Lotus Notes
LU (Logical Unit) Entities
LVDS (Low-Voltage Differential Signaling)
M
MAC (Media Access Control)
Mac OS
MAE (Metropolitan Area Exchange)
Mailing List Programs
Mainframe
Majordomo
MAN (Metropolitan Area Network)
Managed Systems
Management
MAPI (Messaging Application Programming Interface)
Markup Language
Media Access Control Methods
Media Gateway
Megaco
MEMS (Micro-Electromechanical Systems)
Message Digest Protocols
Message-Oriented Middleware
Messaging Services, Mobile
Messaging Systems
Metadata
Metadirectories
Metro Access Network
MGCP (Media Gateway Control Protocol)
MIB (Management Information Base)
Microsoft
Microsoft Active Directory
Microsoft BackOffice
Microsoft DNA (Digital interNet Application)
Microsoft Exchange
Microsoft Windows
Microsoft Windows File Systems
Microsoft.NET
Microwave Communications
Middleware and Messaging
MIME (Multipurpose Internet Mail Extension)
Mirroring
MLPPP (Multilink PPP)
MMDS (Multichannel Multipoint Distribution Service)
Mobile Computing
Mobile IP
Modems
Modulation Techniques
MOM (Message-Oriented Middleware)
MOSPF (Multicast OSPF)
MOSS (MIME Object Security Services)
Motif
MP?S (Multiprotocol Lambda Switching)
MP3
MPLS (Multiprotocol Label Switching)
MPOA (Multiprotocol over ATM)
MPP (Massively Parallel Processor) Systems
MSP (Management Service Provider)
MTA (Message Transfer Agent)
MTU (Maximum Transmission Unit)
Multicasting
Multihoming
Multilayer Switching
Multilink Point-to-Point Protocol
Multimedia
Multiplexing and Multiplexers
Multiprocessing
Multitiered Architectures
N
NADH (North American Digital Hierarchy)
NAK (Negative Acknowledgment)
Name Services
Named Pipes
NAP (Network Access Point)
NAS (Network Access Server)
NAS (Network Attached Storage)
NAT (Network Address Translation)
NBMA (Nonbroadcast Multiple Access)
NC (Network Computer)
NCP (NetWare Core Protocol)
NDIS (Network Driver Interface Specification)
NDMP (Network Data Management Protocol)
NDS (Novell Directory Services)
NetBIOS/NetBEUI
Netcasting
NetPC
Netscape
NetWare, Novell
Network Access Methods
Network Access Services
Network Addressing Schemes
Network Analyzers
Network Appliances
Network Applications
Network Architecture
Network Computer Devices
Network Concepts
Network Connection Technologies
Network Core Technologies
Network Design and Construction
Network Interface Card
Network Layer Protocols
Network Management
Network Operating Systems
Network Operations Center
Network Processors
Network Service Providers
Network, Public
Newsfeed Services
Newsgroups
NFS (Network File System)
NGN (Next Generation Network)
NHRP (Next Hop Resolution Protocol)
NIC (Network Interface Card)
NII (National Information Infrastructure)
NIS (Network Information System)
NIST (National Institute of Standards and Technology)
NLSP (NetWare Link Services Protocol)
NNI (Network Node Interface), ATM
NNTP (Network News Transport Protocol)
NOC (Network Operations Center)
Node
NOS (Network Operating Systems)
Novell
Novell Directory Services
Novell NetWare
Novell NetWare File System
NPN (New Public Network)
NREN (National Research and Education Network)
NSA (National Security Agency)
NSF (National Science Foundation) and NSFnet
NSP (Network Service Provider)
NTFS (New Technology File System)
NTP (Network Time Protocol)
NUMA (Non-Uniform Memory Access)
O
OAG (Open Applications Group)
OBI (Open Buying on the Internet)
Object Management Architecture
Object Technologies
OC (Optical Carrier)
ODBC (Open Database Connectivity)
ODI (Open Data-Link Interface)
ODMA (Open Document Management API)
OFDM (Orthogonal Frequency Division Multiplexing)
OIM (Open Information Model)
OLAP (Online Analytical Processing)
OLE (Object Linking and Embedding)
OLE DB
OLTP (Online Transaction Processing)
OMA (Object Management Architecture)
OMG (Object Management Group)
One-Time Password Authentication
One-Way Hash Functions
Open Group
Open Source Software
Open Systems
Open Transport Protocol
OpenDoc
OpenView Management System
OpenVMS
Operating Systems
OPSEC (Open Platform for Security)
Optical Carrier Standards
Optical Libraries
Optical Networks
Optimization
Oracle
ORB (Object Request Broker)
Organizations
OS/2 Warp
OSI (Open Systems Interconnection) Model
OSP (Open Settlement Protocol)
OSPF (Open Shortest Path First) Routing
OSRP (Optical Signaling & Routing Protocol)
OTP (Open Trading Protocol)
Outsourcing
OXYGEN
P
P2P (Peer-to-Peer Communications)
P3P (Platform for Privacy Preferences)
Packet over SONET
Packet Radio Data Networks
Packet Rings
PacketCable
Packets and Packet-Switching Networks
PAN (Personal Area Network)
PAP (Password Authentication Protocol)
Parallel Interface
Parallel Processing
Partitions and Partition Management
Passwords
Path MTU Discovery
PBX (Private Branch Exchange)
PCI (Peripheral Component Interface)
PDH (Pleiochronous Digital Hierarchy)
Peering
Peer-to-Peer Communication
PEM (Privacy-Enhanced Mail)
Performance Measurement and Optimization
Perl
Permissions in Windows NT/Windows 2000
Personal Area Network
PGP (Pretty Good Privacy)
Physical Layer, OSI Model
PICS (Platform for Internet Content Selection)
PIM (Protocol Independent Multicast)
Ping (Packet Internet Groper)
PINT (PSTN and Internet Interworking)
Pipes
PKCS (Public-Key Cryptography Specification)
PKI (Public-Key Infrastructure)
PKIX (Public-Key Infrastructure X.509)
PNNI (Private Network-to-Network Interface)
Point-to-Point Communications
Policy-Based Management
Policy-Based Routing on the Internet
Polling
PON (Passive Optical Network)
PoP (Point of Presence)
POP (Post Office Protocol)
Portal
Ports, TCP/IP
PoS (Packet over SONET)
POTS (Plain Old Telephone Service)
Power and Grounding Problems and Solutions
Power Line Access Services
PPP (Point-to-Point Protocol)
PPP Multilink
PPS (Packets per Second)
PPTP (Point-to-Point Tunneling Protocol)
Premises Distribution System
Presence Monitoring
Presentation Layer, OSI Model
Printing
Prioritization of Network Traffic
Private Network
Private-Key Cryptography
Promiscuous Mode
Propagation Delay
Protocol Analyzers
Protocols and Protocol Stacks
Proxy Caching
Proxy Servers
PSTN (Public-Switched Telephone Network)
Public Networks
Public-Key Cryptography
Public-Key Infrastructure
Push and Pull
PVC (Permanent Virtual Circuit)
Q
QAM (Quadrature Amplitude Modulation)
Qbone
QoS (Quality of Service)
Quantum Cryptography
Queuing
R
Radio Communication and Networks
Radio LANs
Radio on the Internet
RADIUS (Remote Authentication Dial-In User Service)
RAID (Redundant Arrays of Inexpensive Disks)
RAP (Resource Allocation Protocol)
RARP (Reverse Address Resolution Protocol)
RAS (Remote Access Server)
Rate Control
RBOCs (Regional Bell Operating Companies)
RDF (Resource Description Framework)
Real-Time Network Services
Real-Time Operating System
Redirector
Redundancy
Registries on the Internet
Relational Database
Reliable Data Delivery Services
Remote Access
Repeater
Replication
Repository
Requester Software
Reservation of Bandwidth
Residential Broadband
Resilient Packet Rings
Resolver Services
Resource Discovery Services
Resource Management
Retransmission
RFC (Request for Comment)
Ricochet
Rights and Permissions
Ring Network Topology
RIP (Routing Information Protocol)
RIPE (Réseaux IP Européens)
RISC (Reduced Instruction Set Computer)
Rlogin
RMI (Remote Method Invocation)
RMOA (Real Time Multimedia Over ATM)
RMON (Remote Monitoring)
Roaming
Route Aggregation
Route Servers and Routing Arbiter
Route Switching
Routers
Routing
Routing on the Internet
Routing Registries
Routing, Multilayer
RPC (Remote Procedure Call)
RPSL (Routing Policy Specification Language)
RSA
RSIP (Realm-Specific IP)
RSVP (Resource Reservation Protocol)
RTCP (Real-Time Control Protocol)
RTFM (Real-Time Traffic Flow Measurement)
RTOS (Real-Time Operating System)
RTP (Real-time Transport Protocol)
RTSP (Real-Time Streaming Protocol)
S
S/MIME (Secure Multipurpose Internet Mail Extension)
S/WAN (Secure WAN)
SAA (Systems Application Architecture)
Samba
SAN (System Area Network)
SANs (Storage Area Networks)
SAP (Service Advertising Protocol)
SAP (Session Announcement Protocol)
SATAN (Security Administrator's Tool for Analyzing Networks)
Satellite Communication Systems
SBM (Subnet Bandwidth Manager)
Schema
SCSI (Small Computer System Interface)
SCSP (Server Cache Synchronization Protocol)
SCTP (Stream Control Transmission Protocol)
SDH (Synchronous Digital Hierarchy)
SDLC (Synchronous Data Link Control)
SDP (Session Description Protocol)
SDSL (Symmetric Digital Subscriber Line)
Search and Discovery Services
Secret-Key Cryptography
Security
Security Auditing
Segment, Network
Segment, TCP
Sendmail
Sequencing of Packets
Serial Communication and Interfaces
Servers
Service Advertising and Discovery
Service Providers and Carriers
Session Layer, OSI Model
SET (Secure Electronic Transaction)
SFT (System Fault Tolerance)
SGML (Standard Generalized Markup Language)
S-HTTP (Secure Hypertext Transfer Protocol)
Signaling for Call Control
Signals
SIP (Session Initiation Protocol)
SKIP (Simple Key Management for Internet Protocols)
SLA (Service-Level Agreement)
Sliding-Window Flow Control
SLIP (Serial Line Internet Protocol)
Slow Start
SLP (Service Location Protocol)
Smart Cards
SMB (Server Message Blocks)
SMDS (Switched Multimegabit Data Service)
SMIL (Synchronized Multimedia Integration Language)
SMP (Symmetric Multiprocessing)
SMR (Specialized Mobile Radio)
SMS (Short Messaging Service)
SMTP (Simple Mail Transfer Protocol)
SNA (Systems Network Architecture)
Sniffer
SNMP (Simple Network Management Protocol)
SOAP (Simple Object Access Protocol)
Socket
Sockets API
SOCKS
Softswitch
Software Distribution
Solaris, SunSoft
Soliton
SONET (Synchronous Optical Network)
Source Routing
Spanning Tree Algorithm
SPIRITS (Service in the PSTN/IN Requesting InTernet Service)
Spread Spectrum Signaling
SPX (Sequenced Packet Exchange)
SQL (Structured Query Language)
SS7 (Signaling System 7)
SSA (Serial Storage Architecture)
SSH (Secure Shell)
SSL (Secure Sockets Layer)
SSO (Single Sign-On)
SSP (Storage Service Provider)
Standards Groups, Associations, and Organizations
STAR TAP
Stateful and Stateless Connections
Stateful Inspection Technology
Stateless and Call-Back Filing Systems
Static Routing
Storage Management Systems
Storage over IP (SoIP)
Storage Service Provider
Storage Systems
Store-and-Forward Networking
Streaming Transmission
Striping
Structured Cabling Standards
Subnetting
Sun Microsystems
Sun Microsystems Solaris
Supercomputer
Supernetting
SVC (Switched Virtual Circuit)
Switch Fabrics and Bus Design
Switching and Switched Networks
Switching, Multilayer
Symmetrical Multiprocessing
Synchronous Communications
SystemView, IBM
T
T Carriers
T Series ITU Recommendations
TACACS (Terminal Access Controller Access Control System)
Tag Switching
TAPI (Telephony API)
Tariff
TCP (Transmission Control Protocol)
TCP/IP (Transmission Control Protocol/Internet Protocol)
TDD (Time Division Duplexing)
TDM (Time Division Multiplexing)
TDM Networks
TDMA (Time Division Multiple Access)
Telecommunications and Telephone Systems
Telecommunications Regulation
Telecommuting
Teledesic
Telematics
Telephony
Telnet
Terabit Routers
Terminal Servers
Terminal Services
Testing, Diagnostics, and Troubleshooting
TFTP (Trivial File Transfer Protocol)
Thin Clients
Three-Tier Client/Server Model
Throttling
Throughput
TIA (Telecommunications Industry Association)
TIA/EIA Structured Cabling Standards
Time Synchronization Services
TLS (Transport Layer Security)
TMN (Telecommunications Management Network)
TN3270
Token and Token-Passing Access Methods
Token Bus Network
Token Ring Network
Token-Based Authentication
Topology
ToS (Type of Service)
Traffic Management, Shaping, and Engineering
Transaction Processing
Transfer Rates
Transport Layer Security (TLS)
Transport Layer, OSI Model
Transport Protocols and Services
TRIP (Telephony Routing over IP)
Troubleshooting
Trunking
Trust Relationships and Trust Management
Tunnels
Two-Factor Authentication
Two-Phase Commit
Two-Tier Client/Server Model
U
UDA (Universal Data Access)
UDDI (Universal Description, Discovery, and Integration)
UDP (User Datagram Protocol)
ULSNET (Ultra Low-Speed Networking)
UML (Unified Modeling Language)
UMTS (Universal Mobile Telecommunication Services)
UNI (User Network Interface)
Unified Messaging
Universal Service
UNIX
UNIX File System
UPS (Uninterruptible Power Supply)
URI (Uniform Resource Identifier)
URL (Uniform Resource Locator)
URL Parsing
URN (Uniform Resource Name)
USB (Universal Serial Bus)
USENET
Users and Groups
UTP (Unshielded Twisted-Pair) Cable
UUCP (UNIX to UNIX Copy Program)
UWB (Ultra Wideband)
V
VBI (Vertical Blanking Interval)
vBNS (Very high speed Backbone Network Service)
VI Architecture
Videoconferencing
VINES, Banyan
Virtual Circuit
Virtual Dial-Up Services
Virtual Machine, Java
Virtual Reality
Virus and Antivirus Issues
VLAN (Virtual LAN)
VLSM (Variable Length Subnet Masking)
VMS (Virtual Memory System)
VoATM (Voice over ATM)
VoFR (Voice over Frame Relay)
Voice Mail
Voice over IP (VoIP)
Voice/Data Networks
VoIP (Voice over IP)
Volume and Partition Management
VPN (Virtual Private Network)
VRML (Virtual Reality Modeling Language)
VRRP (Virtual Router Redundancy Protocol)
VSAT (Very Small Aperture Terminal)
VTAM (Virtual Telecommunications Access Method
W
W3C (World Wide Web Consortium)
WAN (Wide Area Network)
WAP (Wireless Application Protocol)
Wavelength Division Multiplexing
Wavelength Routing
WBEM (Web-Based Enterprise Management)
WCCP (Web Cache Communication Protocol)
WCS (Wireless Communications Service)
WDM (Wavelength Division Multiplexing)
Web
Web Appliance
Web Caching
Web Technologies and Concepts
Web3D
Web-Based Network Management
Webcasting
WebDAV
Webmaster
WebNFS (Network File System)
WebTV Networks
White Pages Directory Services
Whiteboard Applications
WHOIS ("Who Is")
Windows, Microsoft
WINS (Windows Internet Naming Service)
WinSock
Wired for Management
Wireless Broadband Access Technologies
Wireless Communications
Wireless IP
Wireless LANs
Wireless Local Loop
Wireless Messaging
Wireless Mobile Communications
Wireless Optical Networking
Wireless PANs (Personal Area Networks)
Wiretapping
Wiring and Wiring Standards
WML (Wireless Markup Language)
Workflow Management
Workgroups
World Wide Web
World Wide Web Consortium
WPAN (Wireless Personal Area Network)
X
X Series ITU Recommendations
X Window
X.25
X.400 Message-Handling System
X.500 Directory Services
X.509 Certificates
X/Open
X12 Accredited Standards Committee
xDSL
XHTML
XML (Extensible Markup Language)
XSL (Extensible Style Language)
Y
Z
Z39.50
Zero Administration for Windows Initiative
Zones and Zone Servers
|