⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 rfc1983.txt

📁 著名的RFC文档,其中有一些文档是已经翻译成中文的的.
💻 TXT
📖 第 1 页 / 共 5 页
字号:
      A cracker is an individual who attempts to access computer systems      without authorization.  These individuals are often malicious, as      opposed to hackers, and have many means at their disposal for      breaking into a system.  See also: hacker, Computer Emergency      Response Team, Trojan Horse, virus, worm.   CRC      See: cyclic redundancy checkMalkin                       Informational                     [Page 13]RFC 1983                        Glossary                     August 1996   CREN      See: Corporation for Research and Educational Networking   CU-SeeMe      Pronnounced "See you, See me," CU-SeeMe is a publicly available      videoconferencing program developed at Cornell University.  It      allows anyone with audio/video capabilites and an Internet      connection to videoconference with anyone else with the same      capabilities.  It also allows multiple people to tie into the same      videoconference.   CWIS      See: Campus Wide Information system   Cyberspace      A term coined by William Gibson in his fantasy novel Neuromancer      to describe the "world" of computers, and the society that gathers      around them.      [Source: ZEN]   Cyclic Redundancy Check (CRC)      A number derived from a set of data that will be transmitted.  By      recalculating the CRC at the remote end and comparing it to the      value originally transmitted, the receiving node can detect some      types of transmission errors.  See also: checksum.      [Source: MALAMUD]   DANTE      A non-profit company founded in July 1993 to help the European      research community enhance their networking facilities.  It      focuses on the establishment of a high-speed computer network      infrastructure.   DARPA      Defense Advanced Research Projects Agency      See: Advanced Research Projects Agency   Data Encryption Key (DEK)      Used for the encryption of message text and for the computation of      message integrity checks (signatures).  See also: encryption.   Data Encryption Standard (DES)      A popular, standard encryption scheme.  See also: encryption,      Pretty Good Privacy, RSA.   datagram      A self-contained, independent entity of data carrying sufficient      information to be routed from the source to the destinationMalkin                       Informational                     [Page 14]RFC 1983                        Glossary                     August 1996      computer without reliance on earlier exchanges between this source      and destination computer and the transporting network.  See also:      frame, packet.      [Source: J. Postel]   DCA      See: Defense Information Systems Agency   DCE      Data Circuit-terminating Equipment   DCE      See: Distributed Computing Environment   DDN      See: Defense Data Network   DDN NIC      See: Defense Data Network Network Information Center   DECnet      A proprietary network protocol designed by Digital Equipment      Corporation.  The functionality of each Phase of the      implementation, such as Phase IV and Phase V, is different.   default route      A routing table entry which is used to direct packets addressed to      networks not explicitly listed in the routing table.      [Source: MALAMUD]   Defense Data Network (DDN)      A global communications network serving the US Department of      Defense composed of MILNET, other portions of the Internet, and      classified networks which are not part of the Internet.  The DDN      is used to connect military installations and is managed by the      Defense Information Systems Agency.  See also: Defense Information      Systems Agency.   Defense Data Network Network Information Center (DDN NIC)      Previously called "The NIC", the DDN NIC's primary responsibility      was the assignment of Internet network addresses and Autonomous      System numbers, the administration of the root domain, and      providing information and support services to the Internet for the      DDN.  Since the creation of the InterNIC, the DDN NIC performs      these functions only for the DDN.  See also: Autonomous System,      network address, Internet Registry, InterNIC, Network Information      Center, Request For Comments.Malkin                       Informational                     [Page 15]RFC 1983                        Glossary                     August 1996   Defense Information Systems Agency (DISA)      Formerly called the Defense Communications Agency (DCA), this is      the government agency responsible for managing the DDN portion of      the Internet, including the MILNET.  Currently, DISA administers      the DDN, and supports the user assistance services of the DDN NIC.      See also: Defense Data Network.   DEK      See: Data Encryption Key   DES      See: Data Encryption Standard   dialup      A temporary, as opposed to dedicated, connection between machines      established over a phone line (analog or ISDN).  See also:      Integrated Services Digital Network.   Directory Access Protocol      X.500 protocol used for communication between a Directory User      Agent and a Directory System Agent.      [Source: MALAMUD]   Directory System Agent (DSA)      The software that provides the X.500 Directory Service for a      portion of the directory information base.  Generally, each DSA is      responsible for the directory information for a single      organization or organizational unit.      [Source: RFC1208]   Directory User Agent (DUA)      The software that accesses the X.500 Directory Service on behalf      of the directory user.  The directory user may be a person or      another software element.      [Source: RFC1208]   DISA      See: Defense Information Systems Agency   Distributed Computing Environment (DCE)      An architecture of standard programming interfaces, conventions,      and server functionalities (e.g., naming, distributed file system,      remote procedure call) for distributing applications transparently      across networks of heterogeneous computers.  Promoted and      controlled by the Open Software Foundation (OSF), a consortium led      by Digital, IBM and Hewlett Packard.      [Source: RFC1208]Malkin                       Informational                     [Page 16]RFC 1983                        Glossary                     August 1996   distributed database      A collection of several different data repositories that looks      like a single database to the user.  A prime example in the      Internet is the Domain Name System.   DIX Ethernet      See: Ethernet   DNS      See: Domain Name System   domain      "Domain" is a heavily overused term in the Internet.  It can be      used in the Administrative Domain context, or the Domain Name      context.  See also: Administrative Domain, Domain Name System.   Domain Name System (DNS)      The DNS is a general purpose distributed, replicated, data query      service.  The principal use is the lookup of host IP addresses      based on host names.  The style of host names now used in the      Internet is called "domain name", because they are the style of      names used to look up anything in the DNS.  Some important domains      are: .COM (commercial), .EDU (educational), .NET (network      operations), .GOV (U.S. government), and .MIL (U.S. military).      Most countries also have a domain.  The country domain names are      based on ISO 3166.  For example, .US (United States), .UK (United      Kingdom), .AU (Australia).  See also: Fully Qualified Domain Name,      Mail Exchange Record.   dot address (dotted decimal notation)      Dot address refers to the common notation for IP addresses of the      form A.B.C.D; where each letter represents, in decimal, one byte      of a four byte IP address.  See also: IP address.      [Source: FYI4]   DSA      See: Directory System Agent   DTE      Data Terminal Equipment   DUA      See: Directory User AgentMalkin                       Informational                     [Page 17]RFC 1983                        Glossary                     August 1996   dynamic adaptive routing      Automatic rerouting of traffic based on a sensing and analysis of      current actual network conditions.  NOTE: this does not include      cases of routing decisions taken on predefined information.      [Source: J. Postel]   E1      The basic building block for European multi-megabit data rates,      with a bandwidth of 2.048Mbps.  See also: T1.   E3      A European standard for transmitting data at 57.344Mbps.  See      also: T3.   EARN      European Academic and Research Network.  See: Trans-European      Research and Education Networking Association.   EBCDIC      See: Extended Binary Coded Decimal Interchange Code   Ebone      A pan-European backbone service.   EFF      See: Electronic Frontier Foundation   EGP      See: Exterior Gateway Protocol   Electronic Frontier Foundation (EFF)      A foundation established to address social and legal issues      arising from the impact on society of the increasingly pervasive      use of computers as a means of communication and information      distribution.   Electronic Mail (email)      A system whereby a computer user can exchange messages with other      computer users (or groups of users) via a communications network.      Electronic mail is one of the most popular uses of the Internet.      [Source: NNSC]   email      See: Electronic mail   email address      The domain-based or UUCP address that is used to send electronic      mail to a specified destination.  For example an editor's addressMalkin                       Informational                     [Page 18]RFC 1983                        Glossary                     August 1996      is "gmalkin@xylogics.com".  See also: bang path, mail path, UNIX-      to-UNIX CoPy.      [Source: ZEN]   encapsulation      The technique used by layered protocols in which a layer adds      header information to the protocol data unit (PDU) from the layer      above.  For example, in Internet terminology, a packet would      contain a header from the physical layer, followed by a header      from the datalink layer (e.g.  Ethernet), followed by a header      from the network layer (IP), followed by a header from the      transport layer (e.g. TCP), followed by the application protocol      data.      [Source: RFC1208]   encryption      Encryption is the manipulation of a packet's data in order to      prevent any but the intended recipient from reading that data.      There are many types of data encryption, and they are the basis of      network security.  See also: Data Encryption Standard.   error checking      The examination of received data for transmission errors.  See      also: checksum, Cyclic Redundancy Check.   Ethernet      A 10-Mb/s standard for LANs, initially developed by Xerox, and      later refined by Digital, Intel and Xerox (DIX).  All hosts are      connected to a coaxial cable where they contend for network access      using a Carrier Sense Multiple Access with Collision Detection      (CSMA/CD) paradigm.  See also: 802.x, Local Area Network, token      ring.   Ethernet meltdown      An event that causes saturation, or near saturation, on an      Ethernet.  It usually results from illegal or misrouted packets      and typically lasts only a short time.  See also: broadcast storm.      [Source: COMER]   Extended Binary Coded Decimal Interchange Code (EBCDIC)      A standard character-to-number encoding used primarily by IBM      computer systems.  See also: ASCII.   Exterior Gateway Protocol (EGP)      A protocol which distributes routing information to the routers      which connect autonomous systems.  The term "gateway" is      historical, as "router" is currently the preferred term.  There is      also a routing protocol called EGP defined in RFC 904.  See also:Malkin                       Informational                     [Page 19]RFC 1983                        Glossary                     August 1996      Autonomous System, Border Gateway Protocol, Interior Gateway      Protocol.   eXternal Data Representation (XDR)      A standard for machine independent data structures developed by      Sun Microsystems and defined in RFCs 1014 and 1832.  It is similar      to ASN.1.  See also: Abstract Syntax Notation One.

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -