id | term | description |
403 |
T3 |
A term for a digital carrier facility used to transmit a DS-3 formatted digital signal at 44.746 megabits per second. [Source: FYI4] |
404 |
TAC |
See: Terminal Access Controller (TAC) |
405 |
talk |
A protocol which allows two people on remote computers to communicate in a real-time fashion. See also: Internet Relay Chat. |
406 |
TCP |
See: Transmission Control Protocol |
407 |
TCP/IP Protocol Suite |
Transmission Control Protocol over Internet Protocol. This is a common shorthand which refers to the suite of transport and application protocols which runs over IP. See also: IP, ICMP, TCP, UDP, FTP, Telnet, SMTP, SNMP. |
408 |
TELENET |
A public packet switched network using the CCITT X.25 protocols. It should not be confused with Telnet. |
409 |
Telnet |
Telnet is the Internet standard protocol for remote terminal connection service. It is defined in STD 8, RFC 854 and extended with options by many other RFCs. |
410 |
Terminal Access Controller (TAC) |
A device which connects terminals to the Internet, usually using dialup modem connections and the TACACS protocol. |
411 |
terminal emulator |
A program that allows a computer to emulate a terminal. The workstation thus appears as a terminal to the remote host. [Source: MALAMUD] |
412 |
terminal server |
A device which connects many terminals to a LAN through one network connection. A terminal server can also connect many network users to its asynchronous ports for dial-out capabilities and printer access. See also: Local Area Network. |
413 |
Three Letter Acronym (TLA) |
A tribute to the use of acronyms in the computer field. See also: Extended Four Letter Acronym. |
414 |
Time to Live (TTL) |
A field in the IP header which indicates how long this packet should be allowed to survive before being discarded. It is primarily used as a hop count. See also: Internet Protocol. [Source: MALAMUD] |
415 |
TLA |
See: Three Letter Acronym |
416 |
TN3270 |
A variant of the Telnet program that allows one to attach to IBM mainframes and use the mainframe as if you had a 3270 or similar terminal. [Source: BIG-LAN] |
417 |
token ring |
A token ring is a type of LAN with nodes wired into a ring. Each node constantly passes a control message (token) on to the next; whichever node has the token can send a message. Often, "Token Ring" is used to refer to the IEEE 802.5 token ring standard, which is the most common type of token ring. See also: 802.x, Local Area Network. |
418 |
topology |
A network topology shows the computers and the links between them. A network layer must stay abreast of the current network topology to be able to route packets to their final destination. [Source: MALAMUD] |
419 |
transceiver |
Transmitter-receiver. The physical device that connects a host interface to a local area network, such as Ethernet. Ethernet transceivers contain electronics that apply signals to the cable and sense collisions. [Source: RFC1208] |
420 |
transit network |
A transit network passes traffic between networks in addition to carrying traffic for its own hosts. It must have paths to at least two other networks. See also: backbone, stub network. |
421 |
Transmission Control Protocol (TCP) |
An Internet Standard transport layer protocol defined in STD 7, RFC 793. It is connection-oriented and stream-oriented, as opposed to UDP. See also: connection-oriented, stream-oriented, User Datagram Protocol. |
422 |
Trojan Horse |
A computer program which carries within itself a means to allow the creator of the program access to the system using it. See also: virus, worm. See RFC 1135. |
423 |
TTFN |
Ta-Ta For Now |
424 |
TTL |
See: Time to Live |
425 |
tunnelling |
Tunnelling refers to encapsulation of protocol A within protocol B, such that A treats B as though it were a datalink layer. Tunnelling is used to get data between administrative domains which use a protocol that is not supported by the internet connecting those domains. See also: Administrative Domain. |
426 |
twisted pair |
A type of cable in which pairs of conductors are twisted together to produce certain electrical properties. |
427 |
UDP |
See: User Datagram Protocol |
428 |
Universal Time Coordinated (UTC) |
This is Greenwich Mean Time. [Source: MALAMUD] |
429 |
UNIX-to-UNIX CoPy (UUCP) |
This was initially a program run under the UNIX operating system that allowed one UNIX system to send files to another UNIX system via dial-up phone lines. Today, the term is more commonly used to describe the large international network which uses the UUCP protocol to pass news and electronic mail. See also: Electronic Mail, Usenet. |
430 |
urban legend |
A story, which may have started with a grain of truth, that has been embroidered and retold until it has passed into the realm of myth. It is an interesting phenonmenon that these stories get spread so far, so fast and so often. Urban legends never die, they just end up on the Internet! Some legends that periodically make their rounds include "The Infamous Modem Tax," "Craig Shergold/Brain Tumor/Get Well Cards," and "The $250 Cookie Recipe". [Source: LAQUEY] |
431 |
Usenet |
A collection of thousands of topically named newsgroups, the computers which run the protocols, and the people who read and submit Usenet news. Not all Internet hosts subscribe to Usenet and not all Usenet hosts are on the Internet. See also: Network News Transfer Protocol, UNIX-to-UNIX CoPy. [Source: NWNET] |
432 |
User Datagram Protocol (UDP) |
An Internet Standard transport layer protocol defined in STD 6, RFC 768. It is a connectionless protocol which adds a level of reliability and multiplexing to IP. See also: connectionless, Transmission Control Protocol. |
433 |
UTC |
See: Universal Time Coordinated |
434 |
UUCP |
See: UNIX-to-UNIX CoPy |
435 |
virtual circuit |
A network service which provides connection-oriented service regardless of the underlying network structure. See also: connection-oriented. |
436 |
virus |
A program which replicates itself on computer systems by incorporating itself into other programs which are shared among computer systems. See also: Trojan Horse, worm. |
437 |
W3 |
See: World Wide Web |
438 |
WAIS |
See: Wide Area Information Servers |
439 |
WAN |
See: Wide area network |
440 |
WG |
Working Group |
441 |
white pages |
The Internet supports several databases that contain basic information about users, such as email addresses, telephone numbers, and postal addresses. These databases can be searched to get information about particular individuals. Because they serve a function akin to the telephone book, these databases are often referred to as "white pages. See also: Knowbot, WHOIS, X.500. |
442 |
WHOIS |
An Internet program which allows users to query a database of people and other Internet entities, such as domains, networks, and hosts, kept at the DDN NIC. The information for people shows a person's company name, address, phone number and email address. See also: Defense Data Network Network ..., white pages, Knowbot, X.500. [Source: FYI4] |
443 |
Wide Area Information Servers (WAIS) |
A distributed information service which offers simple natural language input, indexed searching for fast retrieval, and a "relevance feedback" mechanism which allows the results of initial searches to influence future searches. Public domain implementations are available. See also: archie, Gopher, Prospero. |
444 |
Wide Area Network (WAN) |
A network, usually constructed with serial lines, which covers a large geographic area. See also: Local Area Network, Metropolitan Area Network. |
445 |
World Wide Web (WWW or W3) |
A hypertext-based, distributed information system created by researchers at CERN in Switzerland. Users may create, edit or browse hypertext documents. The clients and servers are freely available. |
446 |
worm |
A computer program which replicates itself and is self- propagating. Worms, as opposed to viruses, are meant to spawn in network environments. Network worms were first defined by Shoch & Hupp of Xerox in ACM Communications (March 1982). The Internet worm of November 1988 is perhaps the most famous; it successfully propagated itself on over 6,000 systems across the Internet. See also: Trojan Horse, virus. |
447 |
WRT |
With Respect To |
448 |
WWW |
See: World Wide Web |
449 |
WYSIWYG |
What You See is What You Get |
450 |
X |
X is the name for TCP/IP based network-oriented window systems. Network window systems allow a program to use a display on a different computer. The most widely-implemented window system is X11 - a component of MIT's Project Athena. |
451 |
X.25 |
A data communications interface specification developed to describe how data passes into and out of public data communications networks. The CCITT and ISO approved protocol suite defines protocol layers 1 through 3. |
452 |
X.400 |
The CCITT and ISO standard for electronic mail. It is widely used in Europe and Canada. |
453 |
X.500 |
The CCITT and ISO standard for electronic directory services. See also: white pages, Knowbot, WHOIS |
454 |
XDR |
See: eXternal Data Representation |
455 |
Xerox Network System (XNS) |
A network developed by Xerox corporation. Implementations exist for both 4.3BSD derived systems, as well as the Xerox Star computers. |
456 |
XNS |
See: Xerox Network System |
457 |
Yellow Pages (YP) |
A service used by UNIX administrators to manage databases distributed across a network. |
458 |
YP |
See: Yellow Pages |
459 |
zone |
A logical group of network devices (AppleTalk). |