`Request for Comments: 1983 Xylogics
`FYI: 18 August 1996
`Obsoletes: 1392
`Category: Informational
`
` Internet Users’ Glossary
`
`Status of this Memo
`
` This memo provides information for the Internet community. This memo
` does not specify an Internet standard of any kind. Distribution of
` this memo is unlimited.
`
`Abstract
`
` There are many networking glossaries in existence. This glossary
` concentrates on terms which are specific to the Internet. Naturally,
` there are entries for some basic terms and acronyms because other
` entries refer to them.
`
`Acknowledgements
`
` This document is the work of the User Glossary Working Group of the
` User Services Area of the Internet Engineering Task Force. I would
` especially like to thank Ryan Moats/InterNIC for his careful review
` and many contributions to this document.
`
`Table of Contents
`
` non-letter . . 2 I . . . . . . . 26 R . . . . . . . 46
` A . . . . . . . 2 J . . . . . . . 33 S . . . . . . . 49
` B . . . . . . . 7 K . . . . . . . 33 T . . . . . . . 52
` C . . . . . . . 10 L . . . . . . . 33 U . . . . . . . 55
` D . . . . . . . 14 M . . . . . . . 35 V . . . . . . . 57
` E . . . . . . . 18 N . . . . . . . 39 W . . . . . . . 57
` F . . . . . . . 20 O . . . . . . . 42 X . . . . . . . 59
` G . . . . . . . 22 P . . . . . . . 43 Y . . . . . . . 60
` H . . . . . . . 23 Q . . . . . . . 46 Z . . . . . . . 60
`
` References . . . . . . . . . . . . . . . . . . . . . . . . . . 61
` Security Considerations . . . . . . . . . . . . . . . . . . . . 62
` Editor’s Address . . . . . . . . . . . . . . . . . . . . . . . 62
`
`Malkin Informational [Page 1]
`
`Petitioners The Mangrove Partners Master Fund, Ltd., Apple Inc., and Black Swamp IP, LLC
`IPR2015-01047, Ex. 1037, p. 1
`
`
`
`
`RFC 1983 Glossary August 1996
`
`Glossary
`
` 10Base2
` A physical layer communications specification for 10Mbps, baseband
` data transmission over a coaxial cable (Thinnet) with a maximum
` cable segment length of 200 meters.
`
` 10Base5
` A physical layer communications specification for 10Mbps, baseband
` data transmission over a coaxial cable (Thicknet) with a maximum
` cable segment length of 500 meters.
`
` 10BaseF
` A physical layer communications specification for 10Mbps, baseband
` data transmission over a fiber-optic cable.
`
` 10BaseT
` A physical layer communications specification for 10Mbps, baseband
` data transmission over a twisted-pair copper wire.
`
` 802.x
` The set of IEEE standards for the definition of LAN protocols.
` See also: IEEE.
`
` 822
` See: RFC 822
`
` :-)
` This odd symbol is one of the ways a person can portray "mood" in
` the very flat medium of computers--by using "smiley faces". This
` is "metacommunication", and there are literally hundreds of such
` symbols, from the obvious to the obscure. This particular example
` expresses "happiness". Don’t see it? Tilt your head to the left
` 90 degrees. Smiles are also used to denote sarcasm.
` [Source: ZEN]
`
` abstract syntax
` A description of a data structure that is independent of machine-
` oriented structures and encodings.
` [Source: RFC1208]
`
` Abstract Syntax Notation One (ASN.1)
` The language used by the OSI protocols for describing abstract
` syntax. This language is also used to encode SNMP packets. ASN.1
` is defined in ISO documents 8824.2 and 8825.2. See also: Basic
` Encoding Rules.
`
`Malkin Informational [Page 2]
`
`Petitioners The Mangrove Partners Master Fund, Ltd., Apple Inc., and Black Swamp IP, LLC
`IPR2015-01047, Ex. 1037, p. 2
`
`
`
`
`RFC 1983 Glossary August 1996
`
` Acceptable Use Policy (AUP)
` Many transit networks have policies which restrict the use to
` which the network may be put. For example, some networks may only
` be used for non-commercial purposes. Some AUPs limit the type of
` material which can be made available to the public (e.g.,
` pornographic material). Enforcement of AUPs varies with the
` network. See also: netiquette.
`
` Access Control List (ACL)
` Most network security systems operate by allowing selective use of
` services. An Access Control List is the usual means by which
` access to, and denial of, services is controlled. It is simply a
` list of the services available, each with a list of the hosts
` permitted to use the service.
`
` ACK
` See: Acknowledgment
`
` acknowledgment (ACK)
` A type of message sent to indicate that a block of data arrived at
` its destination without error. See also: Negative
` Acknowledgement.
` [Source: NNSC]
`
` ACL
` See: Access Control List
`
` AD
` See: Administrative Domain
`
` address
` There are four types of addresses in common use within the
` Internet. They are email address; IP, internet or Internet
` address; hardware or MAC address; and URL. See also: email
` address, IP address, internet address, MAC address, Uniform
` Resource Locator.
`
` address mask
` A bit mask used to identify which bits in an IP address correspond
` to the network and subnet portions of the address. This mask is
` often referred to as the subnet mask because the network portion
` of the address (i.e., the network mask) can be determined by the
` encoding inherent in an IP address. See also: Classless Inter-
` domain Routing.
`
`Malkin Informational [Page 3]
`
`Petitioners The Mangrove Partners Master Fund, Ltd., Apple Inc., and Black Swamp IP, LLC
`IPR2015-01047, Ex. 1037, p. 3
`
`
`
`
`RFC 1983 Glossary August 1996
`
` address resolution
` Conversion of a network-layer address (e.g. IP address) into the
` corresponding physical address (e.g., MAC address). See also: IP
` address, MAC address.
`
` Address Resolution Protocol (ARP)
` Used to dynamically discover the low level physical network
` hardware address that corresponds to the high level IP address for
` a given host. ARP is limited to physical network systems that
` support broadcast packets that can be heard by all hosts on the
` network. See also: proxy ARP, Reverse Address Resolution
` Protocol.
`
` Administrative Domain (AD)
` A collection of hosts and routers, and the interconnecting
` network(s), managed by a single administrative authority.
`
` Advanced Research Projects Agency (ARPA)
` An agency of the U.S. Department of Defense responsible for the
` development of new technology for use by the military. ARPA
` (formerly known as DARPA, nee ARPA) was responsible for funding
` much of the development of the Internet we know today, including
` the Berkeley version of Unix and TCP/IP.
` [Source: NNSC]
`
` Advanced Research Projects Agency Network (ARPANET)
` A pioneering longhaul network funded by ARPA. Now retired, it
` served as the basis for early networking research as well as a
` central backbone during the development of the Internet. The
` ARPANET consisted of individual packet switching computers
` interconnected by leased lines. See also: Advanced Research
` Projects Agency.
` [Source: FYI4]
`
` agent
` In the client-server model, the part of the system that performs
` information preparation and exchange on behalf of a client or
` server application.
` [Source: RFC1208]
`
` alias
` A name, usually short and easy to remember, that is translated
` into another name, usually long and difficult to remember.
`
` American National Standards Institute (ANSI)
` This organization is responsible for approving U.S. standards in
` many areas, including computers and communications. Standards
` approved by this organization are often called ANSI standards
`
`Malkin Informational [Page 4]
`
`Petitioners The Mangrove Partners Master Fund, Ltd., Apple Inc., and Black Swamp IP, LLC
`IPR2015-01047, Ex. 1037, p. 4
`
`
`
`
`RFC 1983 Glossary August 1996
`
` (e.g., ANSI C is the version of the C language approved by ANSI).
` ANSI is a member of ISO. See also: International Organization for
` Standardization.
` [Source: NNSC]
`
` American Standard Code for Information Interchange (ASCII)
` A standard character-to-number encoding widely used in the
` computer industry. See also: EBCDIC.
`
` anonymous FTP
` Anonymous FTP allows a user to retrieve documents, files,
` programs, and other archived data from anywhere in the Internet
` without having to establish a userid and password. By using the
` special userid of "anonymous" the network user will bypass local
` security checks and will have access to publicly accessible files
` on the remote system. See also: archive site, File Transfer
` Protocol, World Wide Web.
`
` ANSI
` See: American National Standards Institute
`
` API
` See: Application Program Interface
`
` Appletalk
` A networking protocol developed by Apple Computer for
` communication between Apple Computer products and other computers.
` This protocol is independent of the network layer on which it is
` run. Current implementations exist for Localtalk, a 235Kb/s local
` area network; and Ethertalk, a 10Mb/s local area network.
` [Source: NNSC]
`
` application
` A program that performs a function directly for a user. FTP, mail
` and Telnet clients are examples of network applications.
`
` application layer
` The top layer of the network protocol stack. The application
` layer is concerned with the semantics of work (e.g. formatting
` electronic mail messages). How to represent that data and how to
` reach the foreign node are issues for lower layers of the network.
` [Source: MALAMUD]
`
` Application Program Interface (API)
` A set of calling conventions which define how a service is invoked
` through a software package.
` [Source: RFC1208]
`
`Malkin Informational [Page 5]
`
`Petitioners The Mangrove Partners Master Fund, Ltd., Apple Inc., and Black Swamp IP, LLC
`IPR2015-01047, Ex. 1037, p. 5
`
`
`
`
`RFC 1983 Glossary August 1996
`
` archie
` A system to automatically gather, index and serve information on
` the Internet. The initial implementation of archie provided an
` indexed directory of filenames from all anonymous FTP archives on
` the Internet. Later versions provide other collections of
` information. See also: archive site, Gopher, Prospero, Wide Area
` Information Servers.
`
` archive site
` A machine that provides access to a collection of files across the
` Internet. For example, an anonymous FTP archive site provides
` access to arcived material via the FTP protocol. WWW servers can
` also serve as archive sites. See also: anonymous FTP, archie,
` Gopher, Prospero, Wide Area Information Servers, World Wide Web.
`
` ARP
` See: Address Resolution Protocol
`
` ARPA
` See: Advanced Research Projects Agency
`
` ARPANET
` See: Advanced Research Projects Agency Network
`
` AS
` See: Autonomous System
`
` ASCII
` See: American Standard Code for Information Interchange
`
` ASN.1
` See: Abstract Syntax Notation One
`
` assigned numbers
` The RFC [STD2] which documents the currently assigned values from
` several series of numbers used in network protocol
` implementations. This RFC is updated periodically and, in any
` case, current information can be obtained from the Internet
` Assigned Numbers Authority (IANA). If you are developing a
` protocol or application that will require the use of a link,
` socket, port, protocol, etc., please contact the IANA to receive a
` number assignment. See also: Internet Assigned Numbers Authority,
` STD.
` [Source: STD2]
`
`Malkin Informational [Page 6]
`
`Petitioners The Mangrove Partners Master Fund, Ltd., Apple Inc., and Black Swamp IP, LLC
`IPR2015-01047, Ex. 1037, p. 6
`
`
`
`
`RFC 1983 Glossary August 1996
`
` Asynchronous Transfer Mode (ATM)
` A standard which defines high-load, high-speed (1.544Mbps through
` 1.2Gbps), fixed-size packet (cell) switching with dynamic
` bandwidth allocation. ATM is also known as "fast packet."
`
` ATM
` See: Asynchronous Transfer Mode
`
` AUP
` See: Acceptable Use Policy
`
` authentication
` The verification of the identity of a person or process.
` [Source: MALAMUD]
`
` Autonomous System (AS)
` A collection of routers under a single administrative authority
` using a common Interior Gateway Protocol for routing packets.
`
` backbone
` The top level in a hierarchical network. Stub and transit
` networks which connect to the same backbone are guaranteed to be
` interconnected. See also: stub network, transit network.
`
` bandwidth
` Technically, the difference, in Hertz (Hz), between the highest
` and lowest frequencies of a transmission channel. However, as
` typically used, the amount of data that can be sent through a
` given communications circuit.
`
` bang path
` A series of machine names used to direct electronic mail from one
` user to another, typically by specifying an explicit UUCP path
` through which the mail is to be routed. See also: email address,
` mail path, UNIX-to-UNIX CoPy.
`
` baseband
` A transmission medium through which digital signals are sent
` without complicated frequency shifting. In general, only one
` communication channel is available at any given time. Ethernet is
` an example of a baseband network. See also: broadband, Ethernet.
` [Source: NNSC]
`
`Malkin Informational [Page 7]
`
`Petitioners The Mangrove Partners Master Fund, Ltd., Apple Inc., and Black Swamp IP, LLC
`IPR2015-01047, Ex. 1037, p. 7
`
`
`
`
`RFC 1983 Glossary August 1996
`
` Basic Encoding Rules (BER)
` Standard rules for encoding data units described in ASN.1.
` Sometimes incorrectly lumped under the term ASN.1, which properly
` refers only to the abstract syntax description language, not the
` encoding technique. See also: Abstract Syntax Notation One.
` [Source: NNSC]
`
` BBS
` See: Bulletin Board System
`
` BCNU
` Be Seein’ You
`
` BCP
` The newest subseries of RFCs which are written to describe Best
` Current Practices in the Internet. Rather than specifying a
` protocol, these documents specify the best ways to use the
` protocols and the best ways to configure options to ensure
` interoperability between various vendors’ products. BCPs carry
` the endorsement of the IESG. See also: Request For Comments,
` Internet Engineering Steering Group.
`
` BER
` See: Basic Encoding Rules
`
` Berkeley Internet Name Daemon (BIND)
` Implementation of a DNS server developed and distributed by the
` University of California at Berkeley. Many Internet hosts run
` BIND, and it is the ancestor of many commercial BIND
` implementations. See also: Domain Name System.
`
` Berkeley Software Distribution (BSD)
` Implementation of the UNIX operating system and its utilities
` developed and distributed by the University of California at
` Berkeley. "BSD" is usually preceded by the version number of the
` distribution, e.g., "4.3 BSD" is version 4.3 of the Berkeley UNIX
` distribution. Many Internet hosts run BSD software, and it is the
` ancestor of many commercial UNIX implementations.
` [Source: NNSC]
`
` BGP
` See: Border Gateway Protocol
`
` big-endian
` A format for storage or transmission of binary data in which the
` most significant bit (or byte) comes first. The term comes from
` "Gulliver’s Travels" by Jonathan Swift. The Lilliputians, being
` very small, had correspondingly small political problems. The
`
`Malkin Informational [Page 8]
`
`Petitioners The Mangrove Partners Master Fund, Ltd., Apple Inc., and Black Swamp IP, LLC
`IPR2015-01047, Ex. 1037, p. 8
`
`
`
`
`RFC 1983 Glossary August 1996
`
` Big-Endian and Little-Endian parties debated over whether soft-
` boiled eggs should be opened at the big end or the little end.
` See also: little-endian.
` [Source: RFC1208]
`
` binary
` 11001001
`
` BIND
` See: Berkeley Internet Name Daemon
`
` Birds Of a Feather (BOF)
` A Birds Of a Feather (flocking together) is an informal discussion
` group. It is formed, often ad hoc, to consider a specific issue
` and, therefore, has a narrow focus. See also: Working Group.
`
` Bitnet
` An academic computer network that provides interactive electronic
` mail and file transfer services, using a store-and-forward
` protocol, based on IBM Network Job Entry protocols. Bitnet-II
` encapsulates the Bitnet protocol within IP packets and depends on
` the Internet to route them.
`
` BOF
` See: Birds Of a Feather
`
` BOOTP
` The Bootstrap Protocol, described in RFC 1542, is used for booting
` diskless nodes. See also: Dynamic Host Configuration Protocol,
` Reverse Address Resolution Protocol.
`
` Border Gateway Protocol (BGP)
` The Border Gateway Protocol is an exterior gateway protocol
` defined in RFC 1771. It’s design is based on experience gained
` with EGP, as defined in RFC 904, and EGP usage in the NSFNET
` Backbone, as described in RFCs 1092 and 1093. See also: Exterior
` Gateway Protocol.
`
` bounce
` The return of a piece of mail because of an error in its delivery.
` [Source: ZEN]
`
` bridge
` A device which forwards traffic between network segments based on
` datalink layer information. These segments would have a common
` network layer address. See also: gateway, router.
`
`Malkin Informational [Page 9]
`
`Petitioners The Mangrove Partners Master Fund, Ltd., Apple Inc., and Black Swamp IP, LLC
`IPR2015-01047, Ex. 1037, p. 9
`
`
`
`
`RFC 1983 Glossary August 1996
`
` broadband
` A transmission medium capable of supporting a wide range of
` frequencies. It can carry multiple signals by dividing the total
` capacity of the medium into multiple, independent bandwidth
` channels, where each channel operates only on a specific range of
` frequencies. See also: baseband.
`
` broadcast
` A special type of multicast packet which all nodes on the network
` are always willing to receive. See also: multicast, unicast.
`
` broadcast storm
` An incorrect packet broadcast onto a network that causes multiple
` hosts to respond all at once, typically with equally incorrect
` packets which causes the storm to grow exponentially in severity.
` See also: Ethernet meltdown.
`
` brouter
` A device which bridges some packets (i.e. forwards based on
` datalink layer information) and routes other packets (i.e.
` forwards based on network layer information). The bridge/route
` decision is based on configuration information. See also: bridge,
` router.
`
` BSD
` See: Berkeley Software Distribution
`
` BTW
` By The Way
`
` Bulletin Board System (BBS)
` A computer, and associated software, which typically provides
` electronic messaging services, archives of files, and any other
` services or activities of interest to the bulletin board system’s
` operator. Although BBS’s have traditionally been the domain of
` hobbyists, an increasing number of BBS’s are connected directly to
` the Internet, and many BBS’s are currently operated by government,
` educational, and research institutions. See also: Electronic
` Mail, Internet, Usenet.
` [Source: NWNET]
`
` Campus Wide Information System (CWIS)
` A CWIS makes information and services publicly available on campus
` via kiosks, and makes interactive computing available via kiosks,
` interactive computing systems and campus networks. Services
` routinely include directory information, calendars, bulletin
` boards, databases.
`
`Malkin Informational [Page 10]
`
`Petitioners The Mangrove Partners Master Fund, Ltd., Apple Inc., and Black Swamp IP, LLC
`IPR2015-01047, Ex. 1037, p. 10
`
`
`
`
`RFC 1983 Glossary August 1996
`
` CCIRN
` See: Coordinating Committee for Intercontinental Research Networks
`
` CCITT
` See: Comite Consultatif International de Telegraphique et
` Telephonique
`
` CERT
` See: Computer Emergency Response Team
`
` checksum
` A computed value which is dependent upon the contents of a packet.
` This value is sent along with the packet when it is transmitted.
` The receiving system computes a new checksum based upon the
` received data and compares this value with the one sent with the
` packet. If the two values are the same, the receiver has a high
` degree of confidence that the data was received correctly. See
` also: Cyclic Redundancy Check.
` [Source: NNSC]
`
` CIDR
` See: Classless Inter-domain Routing
`
` circuit switching
` A communications paradigm in which a dedicated communication path
` is established between two hosts, and on which all packets travel.
` The telephone system is an example of a circuit switched network.
` See also: connection-oriented, connectionless, packet switching.
`
` Classless Inter-domain Routing (CIDR)
` A proposal, set forth in RFC 1519, to allocate IP addresses so as
` to allow the addresses to be aggregated when advertised as routes.
` It is based on the elimination of intrinsic IP network addresses;
` that is, the determination of the network address based on the
` first few bits of the IP address. See also: IP address, network
` address, supernet.
`
` client
` A computer system or process that requests a service of another
` computer system or process. A workstation requesting the contents
` of a file from a file server is a client of the file server. See
` also: client-server model, server.
` [Source: NNSC]
`
`Malkin Informational [Page 11]
`
`Petitioners The Mangrove Partners Master Fund, Ltd., Apple Inc., and Black Swamp IP, LLC
`IPR2015-01047, Ex. 1037, p. 11
`
`
`
`
`RFC 1983 Glossary August 1996
`
` client-server model
` A common way to describe the paradigm of many network protocols.
` Examples include the name-server/name-resolver relationship in DNS
` and the file-server/file-client relationship in NFS. See also:
` client, server, Domain Name System, Network File System.
`
` CNI
` See: Coalition for Networked Information
`
` Coalition for Networked Information (CNI)
` A consortium formed by American Research Libraries, CAUSE, and
` EDUCOM (no, they are not acronyms) to promote the creation of, and
` access to, information resources in networked environments in
` order to enrich scholarship and enhance intellectual productivity.
`
` Comite Consultatif International de Telegraphique et Telephonique (
` CCITT)
` This organization is now part of the International
` Telecommunications Union and is responsible for making technical
` recommendations about telephone and data communications systems.
` Every four years CCITT holds plenary sessions where they adopt new
` standards; the most recent was in 1992. Recently, the ITU
` reorganized and CCITT was renamed the ITU-TSS. See also:
` International Telecommunications Union - Telecommunications
` Standards Sector.
`
` Computer Emergency Response Team (CERT)
` The CERT was formed by ARPA in November 1988 in response to the
` needs exhibited during the Internet worm incident. The CERT
` charter is to work with the Internet community to facilitate its
` response to computer security events involving Internet hosts, to
` take proactive steps to raise the community’s awareness of
` computer security issues, and to conduct research targeted at
` improving the security of existing systems. CERT products and
` services include 24-hour technical assistance for responding to
` computer security incidents, product vulnerability assistance,
` technical documents, and tutorials. In addition, the team
` maintains a number of mailing lists (including one for CERT
` Advisories), and provides an anonymous FTP server, at "cert.org",
` where security-related documents and tools are archived. The CERT
` may be reached by email at "cert@cert.org" and by telephone at
` +1-412-268-7090 (24-hour hotline). See also: Advanced Research
` Projects Agency, worm.
`
` congestion
` Congestion occurs when the offered load exceeds the capacity of a
` data communication path.
`
`Malkin Informational [Page 12]
`
`Petitioners The Mangrove Partners Master Fund, Ltd., Apple Inc., and Black Swamp IP, LLC
`IPR2015-01047, Ex. 1037, p. 12
`
`
`
`
`RFC 1983 Glossary August 1996
`
` connection-oriented
` The data communication method in which communication proceeds
` through three well-defined phases: connection establishment, data
` transfer, connection release. TCP is a connection-oriented
` protocol. See also: circuit switching, connectionless, packet
` switching, Transmission Control Protocol.
`
` connectionless
` The data communication method in which communication occurs
` between hosts with no previous setup. Packets between two hosts
` may take different routes, as each is independent of the other.
` UDP is a connectionless protocol. See also: circuit switching,
` connection-oriented, packet switching, User Datagram Protocol.
`
` Coordinating Committee for Intercontinental Research Networks (CCIRN)
` A committee that includes the United States FNC and its
` counterparts in North America and Europe. Co-chaired by the
` executive directors of the FNC and the European Association of
` Research Networks (RARE), the CCIRN provides a forum for
` cooperative planning among the principal North American and
` European research networking bodies. See also: Federal Networking
` Council, RARE.
` [Source: MALAMUD]
`
` core gateway
` Historically, one of a set of gateways (routers) operated by the
` Internet Network Operations Center at Bolt, Beranek and Newman
` (BBN). The core gateway system formed a central part of Internet
` routing in that all groups must advertise paths to their networks
` from a core gateway.
` [Source: MALAMUD]
`
` Corporation for Research and Educational Networking (CREN)
` This organization was formed in October 1989, when Bitnet and
` CSNET (Computer + Science NETwork) were combined under one
` administrative authority. CSNET is no longer operational, but
` CREN still runs Bitnet. See also: Bitnet.
` [Source: NNSC]
`
` cracker
` A cracker is an individual who attempts to access computer systems
` without authorization. These individuals are often malicious, as
` opposed to hackers, and have many means at their disposal for
` breaking into a system. See also: hacker, Computer Emergency
` Response Team, Trojan Horse, virus, worm.
`
` CRC
` See: cyclic redundancy check
`
`Malkin Informational [Page 13]
`
`Petitioners The Mangrove Partners Master Fund, Ltd., Apple Inc., and Black Swamp IP, LLC
`IPR2015-01047, Ex. 1037, p. 13
`
`
`
`
`RFC 1983 Glossary August 1996
`
` CREN
` See: Corporation for Research and Educational Networking
`
` CU-SeeMe
` Pronnounced "See you, See me," CU-SeeMe is a publicly available
` videoconferencing program developed at Cornell University. It
` allows anyone with audio/video capabilites and an Internet
` connection to videoconference with anyone else with the same
` capabilities. It also allows multiple people to tie into the same
` videoconference.
`
` CWIS
` See: Campus Wide Information system
`
` Cyberspace
` A term coined by William Gibson in his fantasy novel Neuromancer
` to describe the "world" of computers, and the society that gathers
` around them.
` [Source: ZEN]
`
` Cyclic Redundancy Check (CRC)
` A number derived from a set of data that will be transmitted. By
` recalculating the CRC at the remote end and comparing it to the
` value originally transmitted, the receiving node can detect some
` types of transmission errors. See also: checksum.
` [Source: MALAMUD]
`
` DANTE
` A non-profit company founded in July 1993 to help the European
` research community enhance their networking facilities. It
` focuses on the establishment of a high-speed computer network
` infrastructure.
`
` DARPA
` Defense Advanced Research Projects Agency
` See: Advanced Research Projects Agency
`
` Data Encryption Key (DEK)
` Used for the encryption of message text and for the computation of
` message integrity checks (signatures). See also: encryption.
`
` Data Encryption Standard (DES)
` A popular, standard encryption scheme. See also: encryption,
` Pretty Good Privacy, RSA.
`
` datagram
` A self-contained, independent entity of data carrying sufficient
` information to be routed from the source to the destination
`
`Malkin Informational [Page 14]
`
`Petitioners The Mangrove Partners Master Fund, Ltd., Apple Inc., and Black Swamp IP, LLC
`IPR2015-01047, Ex. 1037, p. 14
`
`
`
`
`RFC 1983 Glossary August 1996
`
` computer without reliance on earlier exchanges between this source
` and destination computer and the transporting network. See also:
` frame, packet.
` [Source: J. Postel]
`
` DCA
` See: Defense Information Systems Agency
`
` DCE
` Data Circuit-terminating Equipment
`
` DCE
` See: Distributed Computing Environment
`
` DDN
` See: Defense Data Network
`
` DDN NIC
` See: Defense Data Network Network Information Center
`
` DECnet
` A proprietary network protocol designed by Digital Equipment
` Corporation. The functionality of each Phase of the
` implementation, such as Phase IV and Phase V, is different.
`
` default route
` A routing table entry which is used to direct packets addressed to
` networks not explicitly listed in the routing table.
` [Source: MALAMUD]
`
` Defense Data Network (DDN)
` A global communications network serving the US Department of
` Defense composed of MILNET, other portions of the Internet, and
` classified networks which are not part of the Internet. The DDN
` is used to connect military installations and is managed by the
` Defense Information Systems Agency. See also: Defense Information
` Systems Agency.
`
` Defense Data Network Network Information Center (DDN NIC)
` Previously called "The NIC", the DDN NIC’s primary responsibility
` was the assignment of Internet network addresses and Autonomous
` System numbers, the administration of the root domain, and
` providing information and support services to the Internet for the
` DDN. Since the creation of the InterNIC, the DDN NIC performs
` these functions only for the DDN. See also: Autonomous System,
` network address, Internet Registry, InterNIC, Network Information
` Center, Request For Comments.
`
`Malkin Informational [Page 15]
`
`Petitioners The Mangrove Partners Master Fund,