You need to have JavaScript enabled in order to access this site.
Test page 3
Automatically extracted index information
Foreign words and phrases
nb-NO: Norwegian : Norska
Dag Wiese Schartaum
Overvåking i en rettstat in the series Nordisk årbok i rettsinformatikk
sv-SE: Swedish : Svenska
bärbar
En anpassad försvarsunderrättelseverksamhet
exjobb
Försvarets radioanstalt
Internetstiftelsen i Sverige
komplettering
Kursansvarig
mobil
Nätverk och kommunikation
Ringvägen
Signalspaning för polisiära ändamål
Telegrafstyrelsen
Figure captions
A one-input - two output multiplexor - when receiving inputs A and B on its input, then outputs them to two destinations
A two-input multiplexor - when receiving inputs A and B in the two inputs, then outputs them in some order via its output
Adapted from Forouzan Figure 13.21 page 368 and slide 15 of [2]
Add a column and place it in the desired column position
Address slicing
Alice invites Bob to a SIP session
An initial view of Wireshark
As can be seen in the plot there is a gap that occurs in the packet arrival times, it does not go up smoothly as one might expect.
BGP Architecture
Basic Ethernet + IP Architecture - based on Stevens, TCP/IP Illustrated, Volume 2
Basic Router Architecture (assuming a radio and an ethernet interface)
Basic steps in Routing
Routing Control and Data Planes
Burst of
CDMA2000
CU-SeeME centralized architecture
Case diagram of UDP group (W. R. Stevens, TCP/IP Illustrated, V.1, pg. 367)
Cellular IP
Cellular IP location update
Cellular IP-Handover
Cisco's NetFlow switching architecture
Cisco's Tag Switching
Clients using an X server to access one display
Count to infinity problem
Data from (formerly available) https://www.isc.org/solutions/survey/history
Demultiplexing
Demultiplexing based on port number
Downward-demultiplexing
Downward-multiplexing
Encapsulation of data
Escrowing a key
Escrowing a key revisited
Ethernet encapsulation (see Stevens, Volume 1, Figure 2.1, pg. 23)
Example of a Firewall with NAT
Example of a Firewall with a DMZ
Example of stub AS, transit AS, and multihomed AS
Example of the effect of fragmentation due to the datagram being larger than the MTU of the outgoing link
Filtering which takes place as you go up the TCP/IP stack
Firewall and internet gateway
MBONE through firewalls
Firewalls
First step after opening a CSV formatted file
Format of ARP request/reply packet
Format of PPP frame
Format of RARP request/reply packet
From Personal Area Networks (PANs) to Regional Area Networks (RANs) inspired by slide 5 of Carlos Cordeiro, Report on IEEE 802.22, IEEE J-SAC, and IEEE DySPAN 2007 tutorials, TCCN meeting at Globecom on November 27, 2006 (formerly available from http://www.eecs.ucf.edu/tccn/meetings/Report_06.ppt)
From www.dnsserverlist.org - 900 servers query times (2010.03.21)
From www.dnsserverlist.org - top 100 servers query times (2010.03.21)
Future home network
Graphical plot of the congestion window (cwnd) as the connection goes from slow start to congestion avoidance behavior (figure from
Hierarchical FA and Regional Tunneling
How do we know it is the same X?
Mobile IP - Identification
ICMP redirect
IEEE802.2/802.3 (see Stevens, Volume 1, figure 2.1, pg. 23)
IGMP - adapted from the earlier figure (See “Demultiplexing”)
IGMP packets as seen with Ethereal
IP datagram carrying a UDP packet
IP header (see
TCP Header
Internet Protocol version 4 (IPv4) (RFC 791)
IPSec usage red = secure, black = unsecure
IPv4 and IPv6 performance 2015.04.19
IPv4 and IPv6 performance on
IPv6 routing example with multihoming and choice of provider
Information slicing
Information slicing vulnerability
Internet Service Provider (ISP), Network Access Point (NAP)
Lawful Intercept with Key Escrow
MBONE Growth - Doubling time ~8 months
MBONE behaves as if there were a multicast server, but this functionality is distributed rather than centralized.
MIKEY and SRTP
Mapping between host names, IP address, and MAC address
Mattias Ronquist, “TCP Reaction to Rapid Changes of the Link Characteristics due to Handover in a Mobile Environment”, MS Thesis, KTH Royal Institute of Technology, Teleinformatics, August 4, 1999, p.38. This figure appears with the permission of the author.
Mobile-IP IPv4 scenario
Mobile-IP IPv6 scenario
Mobile-IP agent discovery
Mobile-IP optimization problem
Multicast routing via tunnels - the basis of MBONE (see Forouzan Figure 15.14 pg. 453)
Multicast routing: packet replicated by the routers -- not the hosts
Multicast spanning tree
Multiple network technologies -
Multiple network technologies - internetworked together Mobility (WWAN, WLAN, PAN, …) driving us towards Mobile Internet
Multiple-streams
NFS client and NFS server (see
Name and address needed?
Network management process
Note that in this step if you are using the Swedish language version of Microsoft’s Excel - you need to indicate that the "." in the Time column, should be converted to a "," - otherwise you can not do arithmetic on these values (as they look like strings!!!)
Note that it need not be a physical ring, but was often an FDDI switch (such as the DEC Gigaswitch/FDDI).
Note that the entries in the table have to be sorted - to achieve the longest match being at the smallest index.
Note those packets with high or very high delays
On a point-to-point link, there is no need for ARP
Organization of a Web client-server (see
Paths between senders and receivers
Patterns of segments being sent in one direction and ACKs sent in response
Physical and Link layer protocols used for LANs
Ping another machine on the LAN
Plot showing number of packets per second
Processing of IP Datagrams
Processing of network packets via a Virtual Interface
Questioning assumption 1 global observer
Questioning assumption 2 slice observer
RSVP operation between host and router
RSVP protocol mechanism
Regional Tunneling redirect the traffic to the MN's new location
Regional Tunneling redirects the traffic to the MN's new location
Router (R) doing a Proxy ARP to provide MAC address of B
SCTP Daytime example - output from Ethereal
SDN with untrusted controllers
SIP over TLS
SIP trapezoid
SLIP Encapsulation
SOCKS v5 operation
See Forouzan Figure 12.12 page 291
TCP Connection teardown
See Forouzan Figure 12.9 page 286
See Forouzan Figure 13.19 page 363
Server and Network Bandwidth and latency
Set your preferences for the User Interface
Some statistics on the packet trace
Summary of burst data
TFTP messages (see
Taxonomy of Multicast Routing Protocols
The UDP pseudo header in context
The bulk of the forwarding effort is
The resulting view
The routing table tells us which output port to use based on the destination (and possibly the source) IP address. The data plane has to run at packet rates (i.e., in real-time). However, a router also performs a lot of other processing.
Timeline of eight TCP connection for a home page and seven GIF images
Tunneling IP Datagrams
Two alternatives to generate and dump packets
Two alternatives to get packets
UDP datagram showing the 8-byte header
Upward-demultiplexing
Upward-multiplexing
Usability of a voice circuit as a function of end-to-end delay
Use spreadsheet operations over the values
User Bandwidth and latency
Using ARP on host C to determine MAC address of the interface on host B
Using Shamir secret sharing one can split the ley into N parts, such that any M of them are sufficient to recover the session key
Using a Virtual Interface for Tunneling (IP in IP) (adapted from John Ioannidis’s thesis)
Vision-2, 2000 - high level of integration
Vision-3, 2005-2015 - very high level of integration
VoIP and data infrastructure
VoIP architecture
VoIP gateway internals
VoIP packet details
When the indicated process is removed/dies, then the routine is no longer callable by
Where am I? What am I? Who am I? Where am I going? When will I be there? What should I become? Who should I become?
Wireless IP Architecture
X disconnects from location A1 and reconnects at location A2
X is moving from the cell a to the cell b
X moves from A1 to A2, Z not aware of Mobility
X moves from the cell a to the cell b
X moves from the cell a to the cell b, but is still reachable by cell a!
X moves from the cell a to the cell b, but may still reachable by cell a - but both cells are part of the same network
X must send a redirect message to Z, to tell it its new address A2.
Z is communicating with X at A1 and wants to continue when X reconnects at location A2
Zoomed view of the frequency plot
adapted from
key escrow with XOR
linear,
mapping between host names and IP address(es)
plot of frequency for tshark data
protocol layers in the TCP/IP protocol suite (see Stevens, Volume 1, Figure 1.4, pg. 6)
trusted SDN controller
“Welcome (Greeting)” messages answered by “I am” messages
“Welcome (Greeting)” messages from router answered by “I am” messages
Table captions
0xffffff00
0xffffffc0
CODE field
Decrease in total time to produce a response
Definitions of Scope values
Encapsulation of IGMP message in IP datagram
Error codes and their descriptions
FLAGS field bits
Format of ICMP message for Echo request/reply
From
Internet Multicast Addresses
From RFC 4291
HTTP 3-digit response code
HTTP Header names
IGMP message format
OSPF Common Header (see
OSPF Database Description packet (see
OSPF Link State Advertisement general-header
OSPF Link state acknowledgement packet
OSPF Link state request packet
OSPF Link state update packet
OSPF Link state update packet (see
Provide information specific to a particular routing protocol
RIP message format
RIPv2 message format
Reserved Anycast IDs -
Statistics for individual HTTP connections
Quick Index
groups of words
"\hyphenpenalty=5000 \tolerance=1000"
(S)RTCP packets
(S)RTP packets
.ae
.aero
.arpa
.biz
.com
.coop
.edu
.gov
.info
.int
.mil
.museum
.name
.net
.org
.pro
.se
.zw
/0
/1
/10
/11
/12
/13
/14
/15
/16
/17
/18
/19
/2
/20
/21
/22
/23
/24
/25
/26
/27
/28
/29
/3
/30
/31
/4
/5
/6
/7
/8
/9
/etc/named.boot
/etc/resolv.config
/tmp/.X11-unix/Xn
0.0.0.0
0:0:0:0:0:0:0:1
0x02
0x04
0x08
0x10
0xFFFF
0xffffff00
0xffffffc0
1/2
10 GbE
10 Mbps Ethernet
10.0.0.0
10/100/1000/…
100 Mbps Ethernet (100Tx)
100GbE
101
128-bit
16-bit
172.16.0.0
192.168.0
192.168.0.0
1xx
2.944 Mbits/sec
200GbE
224.0.0.1
224.0.0.2
224.0.0.4
224.0.0.9
224.0.1.1
224.0.1.2
2xx
3 Mbps Ethernet
3-way
32-bit
3D
3GPP
3xx
4-bit
4-byte
4.3BSD
400GbE
40GbE
4xx
5xx
64-bit boundary
6NET
6xx
8-byte
<
- A -
A NAP is a historical type of IXP.
A1
A4 sized paper
AAA
AAAA
AADS
ability
ABSTRACT
Accelerated
accept
access
access to dial numbers
accessible
accommodates
Accordingly
Accordingly Typically
ACK
Acknowledgements
Acquiring
Acronyms
Action
Action (2 bits)
active
Active Networking
acts
Actual
Acute
ad hoc
ADAE
adapted
Adapting
adapts
add
added
Additive
address
address-family
Addresses
adds
adjacent
Admin
Admin-Local
Administratively
Adoption
Advantages
advertise
Advertised
advertisements
Advertising
Advertising router
Africa Network Information Center (AFRINIC)
AFRINIC
AFS
AFSDB
Agent
Agents
Aggregate
aggregation
AGP
AH
Aim
Alarm
Alarms
Algorithm
Algorithms
Alice
all-hosts
All-IP
all-routers
all-subnets-directed
allocated
Allow
American Registry for Internet Numbers (ARIN)
Ameritech
Amount
amplification
ANCP
Announcements
Anonymous
ANS
Answer
Answering
anticipated
anycast
anyone
Anything
API
APNIC
Apple
Applet
AppleTalk
Appliances
Application
applications
Apply
Area
ARIN
ARP
ARPANET
AS
AS Explorer
AS-external-LSAs
Ascend Communications
Asia-Pacific Network Information Center (APNIC)
ASIC
ASICs
aspath
assigned
Assigning
Assignment
Assignments
Assistance
association
associations
Assume
assumed
assumes
AT&T
ATM
Atom/AtomPub
attacks
audio
audio/video
AUTH
authentication
authoritative Name Server
Authorization
Authorizes
auto-configuration
Auto-Readdressing
autoconfiguration
automated
Automobiles
Autonomous Systems
Available
avg
AVM
avoid
Avoiding
avoids
Axis Communications AB
- B -
B
backbone
Backbones
Backup
Bad
Badge
Bandwidth
BANs
Base
based
Basestation-a
Basic
Basics
Bassam
BCM56980
BCM88690
Behavior
Benefits
Best
Best-effort
Better
Bezeq (Israel)
BGP
BGP Keepalive message
BGP Notification message
BGP Update message
biff
Binary
bind
binding update
binds
biometric
Bit
Bits
blocks
blogs
Bob
Body
Boeing
Bombing
Book
Boot
BOOTP
bootpc
bootps
Bootstrap
border
bottom
Briscoe
broadband ISDN (B-ISDN)
broadcast
Broadcast datagrams
Broadcom
BSD
BT Research
buffered
Build
Buildings
Builds
Built-in
Burst
Business
Busy
Busy Foreign
BYE
bärbar
- C -
C
C (1 bit)
c/o
CA*net
Cache
caching
CADF
Calculate
CALEA
call
call contents
Caller
Calling
CAM
CAN
CANCEL
CanCERT™
canonical name≡ alias
capacity
Capture
captures
Care of Address
Care-of
care-of-address
carrier
Carry
case
Case 367
Category
Cause
Caveats
CBT
CC
CCNA
CCTLD
CDMA2000
Cellular
Cellular-IP
CERT
CGA
changes
Character
chargen
cheating
Check
checksum
Chief Researcher
Chris
Chris Anderson
chunk
Chunks
CIDR
CIM
CIMI
CIP
circuit-switched
Cisco
Cisco Systems 3810 router
CIX
Claim
Class
Class field
Class-identifier
Classes
Classes of Service
Classically
Clayton Christianson
clean slate
Clear-text
client
Client-identifier
Client-server
clients
Clock
close
Clusters
CMIP
CN
CNAME
Co-located
code
CODE field
Cogent
Collaboration
Collaborations
collaborative
Collect
collects
Combine
comfort-noise
Coming
Command
commercial
Common
Communicates
communication
Communications
community
companies
Company
Compatibility
competition
complete
Completes
compliance
Complicated
ComponentID
Composed
composite
compression
Compute
Computer
computing
Concerning
concluded
concurrent
Conference
configuration
configured
Configuring
Confirms
Congest
Congestion
connect
connected
connection
Connection control
connection-oriented
Connectionless
connections
Consider
Consists
Constraint-based Routing
constructing
Contact
content
Content-Encoding
Content-Length
Content-Type
context
Context-awareness
Context/situation-aware
Contiguous
Contributing
control
Controller
Controller Truck
convenient
Convention
Conventions
conversation
Cookie
cooperation
Copy
copyright owner's permission
correlation
Cost
Count
Counter
Coupling
CPIP
CRC
create
creates
Creative Commons
credentials
CRITIC/ECP
Cryptographic signature
Cryptographically
CSLIP
CU-SeeME
cumulative
current
custom
cut-through
cwnd
- D -
D
D-ITG
DAAD
Dag
Dag Wiese Schartaum
Damon
Danger
DANs
DarkMatter
Darwin
DASH
data
Data Base
Data-driv
Database
datagram
Datagram-oriented
Date
daytime
DDNS
DDX
De facto
De jure
Dead
DEC IP Portal
decimal
DECnet
Decrease in total time to produce a response
default
defense
deferred
Defined
Defined Version
defines
Definitions
Definitions of Scope values
Delay
Delay sensitive
delayed
delete
delivered
delivering
Delivery
Demand-drive
Demilitarized
Demonstrate
demultiplexing
Demultiplexor
Denial
Denial-of-service
dense
Dense Wavelength Division Multiplexing (DWDM)
Derived
DES
description
Designated
designed
Desperate
destination
destination address
Details
determine
Deutsche Telekom
Developed
Device
Devices
DHCP
Dialup
Differences
different
Differentiated
Differentiated services
Diffserv
Dig deeper
digital
Dijkstra
Direct
directly
Dirk Trossen
Disadvantages
disaggregation
discard
discarded
discards
Discovered
discovery
discretionary
Discussions
Disk
display
displays
dissemination
dissemination strategy
Distance
Distance vector
Distance-Vector Multicast Routing Protocol (DVMRP)
Distributed
distributed denial-of service (DDoS)
DiVA
diva2:786398
diverge
Divides
DLPI
DMI
DMTF
DMZ
DNS
DNS Server
DNSSec
Document
Documents
Does anybody have the time?
DoesIPv6
domain
domain name
Don
Don Tapscott and Anthony D. Williams
Dotted
Downward
Downward-demultiplexing
Downward-multiplexing
Dr
DR-Web Manager and Agent
Drawback
Drawbacks
Driven
dropped
DSAP
DST
DTLS
DTN
DUAL
Duplicate
duplicate IP address sent from Ethernet address a:b:c:d:e:f
duplicates
DVMRP
DVR
DWDM
dynamic
dynamically
- E -
E
E-BGP
e-mail
E-MBMS
E-payment
e-science
E_header
Earth
eases
Eavesdropping
echo
ECN
economically
ECTS
edge
educational
Edward J. Snowden
Effnet
EGP
EGRP
EIA-RS
electrical
electronic
Eliminate
Elisabetta Carrara
Embed
embedded
Embratel (Brazil)
Emergency
emWare, Inc.
En
enable
enables
encapsulating
encapsulation
Encapsulation of IGMP message in IP datagram
Encoded
Encodes
Encourages
encrypted
Encryption
end-nodes
end-systems
end-to-end
end-user
End2End Argument
ended
Endpoint
Endpoint-centric
Ends
Ensure a balance of power
Ensures
Enterprise
entire
Entities
Entity
entries
ENUM
enumerated
enumerates
Environment
Envisioned
epidemic routing protocols
Equant
Equant Network Service
ERA
Ericsson Radio Systems AB
Erik
error
Error codes and their descriptions
Error Control
error-correcting
Escrowing
ESP
establish
Established
Establishing
Estimates
Ethernet
Ethernet 23
Ethernet Networks
ethernet_encapsulation.png
EU
Euro-IX
Euro6IX
Europe
European
European Union
Evaluating
Event
Events
Everything
Everything is information
Evolving
Exam
Examination
Example
Examples
Excel
except
Exchange
exjobb
Expanded
Expanding
expected
Experimental Ethernet Nets
Expiration
Expires
explicit
explicitly
Exploits
Explores
Expressed
Extended
Extends
Extension
Extension Bits
Extensions
exterior
External
eXternal Data Representation (XDR)
Extranet
- F -
F
Facilitates
Facilitating
fail
failover
Failure
Fairly
faking
Family
fast
faster
Fax
FBOSS
fc00
FCIP
fd00
FDDI
FE80
February
February 1, 2000
FF00
ff00::0/8
FF01
FF01:0:0:0:0:0:0:1
FF01:0:0:0:0:0:0:2
FF02
FF02:0:0:0:0:0:0:1
FF02:0:0:0:0:0:0:2
FF05
FF08
FF0E
FF0X:0:0:0:0:0:0
FF0X:0:0:0:0:0:0:101 (see
FF0X:0:0:0:0:0:2:0000
FF0X:0:0:0:0:0:2:7FFE
FF0X:0:0:0:0:0:2:8000
ff1
ff1 (flag field 1)
ff2
ff2 (flag field 1)
ff3x::/32
ff70::/12
ffbx::/32
fff0::/12
FH
Fibre
Fibre Channel
Fibre Channel Frame
Fibre Channel Over IP (FCIP)
Fields
file
File Transfer Protocol
Filename
Filter
Filtering
FIN
Final
Finally
FIRE
firewall
Firewalls
FIRST
FIX
Fixed
Fixed Broadband Wireless
Flag
Flag=0
Flag=6
flags
FLAGS field bits
Flash
Flat
Flat-label space
flexible
Flood
flooding
flow
Flow Control
flow id
FO
FO P
Followed
for-profit
Forbidden
force
Foreign
format
Format of ICMP message for Echo request/reply
Forum
Forward
Forwarding
FPGAs
FQDN
FRA
fragment
Fragmentation
Fragments
frame
France's DGSE
FreeBit
FreedomPop
Freely
From
From RFC 4291
Fromhertz
ftp
ftp-data
Full
Full Extensive
full-duplex
Fully
functionality
Functionality is scoped
functions
fundamental
Fundamentals
Furthermore
future
Future and Summary (from slide 25)
Future Internet Research and Experimentation (FIRE)
Försvarets
- G -
G
G.711
G.729
gains
gaming
Gap
Garbage
gateway
Gateway-to-Gateway
gateways
generate
generation
Generation dissemination
generational
Generic
Generic Programming
Generic Routing Encapsulation (GRE)
Gensyn
GET
get-bulk-request
GETALL
gethostbyaddr
gethostbyname
GETLIST
gets
getsockopt
Getting
GGP
Gianluca
GIF
Gigabit
Gigabit Ethernet
Give
Given
GIX
global
Global Internet eXchange (GIX)
Globally
GLOP
GMD FOKUS
Goal
Goals
Goldcorp Challenge
Google
Government
Grades
Grading
Graphical
GraphQL
GRE
GRE encapsulation
greater
group
Group Membership Reduction
group-specific
growth
GSM
GSS-API
gTLD
Guarantees
Guiding
Guilder
Guy Almes
- H -
H
H.225
H.245
H.323
Half
Handover
Hands-free
Hans Vestberg (former CEO of Ericsson)
hardware
Hardwired
HAWAII
HBH
HDLC
HEAD
head of line blocking
header
header compression
Header Length
headers
hear
Heartbeats
Heating
Heating, Ventilation, and Air Conditioning (HVAC)
Heavily
Hellenic
Hello
heterogeneous
hex
Hex.pprefix
Hide
Hierarchical
high profits
Hijacking
HINFO
Historically
History
HLR
Hold
home
Home Address
Home agent
hop
Hop Limit
Hop-by-hop
hops
host
Host information
Host-intelligent
Host-specific
host_a
host_b
host_c
host_d
hostid
Hostinfo
hostname
Hosts
hostTopNControlTable
Hourglass
Hourglass Model
How
HP
HP OpenView Netmetrix WebReporter
HP OpenView World Wide Web Interface
HSPA
http
HTTP 3-digit response code
HTTP Header names
HTTP-NG
http.tcp.www.asdf.com
HTTP/1.0
HTTP/1.1
human
Human Genome
HVAC
Hypertext
- I -
I-BGP
i.e
I/O
IANA
IBM Token Ring
ICANN
ICCC
ICMP
ICMP ICMP
ICT
ICT-keywords-20141203.xlsx
ict.kth.se
ICV
identification
Identifier
identifies
identify
identity
IDRP
IEEE
IEEE 802.11
IEEE 802.15 Wireless Personal Area Network (WPAN)
IEEE 802.16 Metropolitan Area Networks
IEEE 802.3
IEEE 802.3ab
IEEE 802.3ae
IEEE 802.3z
IEEE 802.4
IEEE 802.5
IEEE 802/Source-Route Bridge
IEEE802.2/802.3
IEEE802.2/802.3 23
IETF
IETF SIP
if
If-Modified-Since
ifconfig
iFCP
IGMP
IGMP message format
IGRP
IK1203
IK1550-1552-Acronyms-list-20150424.xlsx
IK1552
IKE
IKEv2
Imagination
Imagine
IMEC
Immediate
Implementation
Implementations
implicit
Improve
improved
Improving
in-addr.arpa
In-band
In-in-IP
In-in-IP Minimal
In-vehicle
Incomplete references
incorporates
Increasingly
Incremental
Indeed
independent
independently
indexed
indicates
Indirect
Indiv
Individual
Indoor
inexpensive
inform-request
informal
Information
Information is scoped
Informational
Infrastructure
infrastructures
initial
Initialization
Initializes
initially
Initiation
Inject
INRIA
Insert
Instead
Institute
Instructor
int
Integrated
Intelligent network (IN)
Inter-arrival
Inter-domain
inter-session
Interaction
Interactive
interconnecting
Interdomain
Interdomain (exterior)
Interestingly
interface
Interface-local
interfaces
interior
Internal
international
Internet
Internet Drafts
Internet eXchange Points (IXs or IXPs)
Internet Group Management Protocol (IGMP)
Internet of Things
Internet protocols and architecture
Internet SCSI (iSCSI)
Internetstiftelsen
Internetstiftelsen i Sverige
Internetwork
Internetwork Packet Exchange/Sequenced Packet Exchange (IPX/SPX)
Internetwork Service Providers
internetworked
internetworking
Internetworking 1
Interpose
Interuniversity Microelectronics Centre
Intra-session
Intradomain
Intradomain (interior)
intranet
Introduce
Introduces
introduction
Invalid
INVENTORS
INVITE
Invites
ION
IP
IP in IP
IP Multimedia Core Network Subsystem (IMS)
IP Security
IP, ICMP, and Tools
IP-address
ipacl
IPerf
iperf3
IPMA
IPMI
IPSec
IPSec, VPNs, Firewalls, and NAT
IPSEC_tunnels
IPv4
IPv4-based
IPv6
IPv6:
IPX
IPX/SPX
IRDA
IRR
ISAKMP
ISBN-10
ISC
iSCSI
ISDN
ISDN Defined
ISI
ISN
ISO
ISOC
ISP
Issues
italic
italics
ITU
ITU G 723.1
ITU G.723.1
ITU G.729
ITU-T
IXP
IXPs
- J -
J
Java
JavaManagement
JavaScript
JBOD
JMAPI
Joining
Jonathan Zittrain
JPL
JPRR
JSON
jumbograms
Just a Bunch of Disks
justify
- K -
K
Katti
KDD
Keep
keepalive
keeping
keeps
kerberos
kerberos5
key
Key Exchanger
keyword
Knowledge-based
Kokusai Denshin Denwa (KDD) Co. Ltd. (Japan)
komplettering
KTH
kth.se
KTH/IT
KTH/Monaco
Kungl Tekniska Högskolan
Kursansvarig
KX
- L -
L
labeling
Lack
LACNIC
LAN
LAN analyzer
LANIC
LANL
LANs
Last-Modified
Latin America and Caribbean Network Information Centre (LANIC)
Laurence Huntley
law enforcement
Lawful
Laws
Layer
layer two tunnels (LTTP)
LBS
leading
Leaking
Learning
learns
leaves
Lecture1-notes-2019.pdf
Lecture10-notes-2019.pdf
Lecture11-notes-2019.pdf
Lecture12-notes-2019.pdf
Lecture13-notes-2019.pdf
Lecture14-notes-2019.pdf
Lecture2-notes-2019.pdf
Lecture3-notes-2019.pdf
Lecture4-notes-2019.pdf
Lecture5-notes-2019.pdf
Lecture6-notes-2019.pdf
Lecture7-notes-2019.pdf
Lecture8-notes-2019.pdf
Lecture9-notes-2019.pdf
Legal
legitimate
length
Length=4
Length=8
less
lets
LFN
LI
Lifetime
lightning
limited
Limits
linear
linearly
link
Link state
Link state ID
Link state type
link-layer
link-local
link-state
Linux
list
listen
Listens
lists
Live
lo0
load
LOC
local
location
Location Defined
Locations
lock
Log
logdaemon
logical
Logically
Logistics
Long tail distribution
longest
Look
Looking
looks
lookup
Loop-back
loopback
loopback address ≡ 127.0.0.1
Loose
loss
lost
lots
Low-cost
LPR
LSA
LSAP
LTE
LTE Advanced
- M -
M
MAC
Machine
MAE-East
MAE-West
magic
mail
mail Defined
Mail eXchange record
mailbox
mailbox Defined
Main
maintaining
maintains
major
MAN
Managed
Management
mandatory
MANET
Mantra
manually
many-to-many
map
mappable
mapping
Mark
Mark Stacey
Marker
Market
market share
MasterCard
Match
Matrix
Matt
Mattias
max
Maximize
Maximum
Maximum response delay
may
MBGP
mbone
MCI
MCTP
mean
Meaning
Measure
Measure Determines
Measure TReno
Measured
Measurements
mechanism
Media
Median
meets
Mellanox
membership
merger
Merit
Merit Internet Performance and Analysis Project (IPMA)
Merit Network Statistics Collection And Reporting Faclility (NetSCARF)
Message
Meta
Metcalfe
Method
Methods
metric
Metrics
MG
MGEN
Mhealth
MIB
Micro
Micropayments
Microsoft's Word
Microsoft’s NetMeeting
Microtrends
MIF
Mike
MIKEY
MIME-Version
min
MINFO
Minimal
Minimal encapsulation
Minimize
minimum
minutes
MIP
MIPMANET
Missing
MIT
Mixing
Mlisten
MN
MNs
mobil
mobile
Mobile
Mobile-IP
Mobile-IP-alternative
Mobile-IPv4
Mobile-IPv6
mobile1
mobility
Mode
Modems
Modified
Module
Modules
Monitoring
monitors
Most
mostly
mount
Mping
MPLS
MR
Mrinfo
mrouted
MS
MSDP
MSR
MSR-α
MSR-β
MSS
Mstat
Mtrace
MTU
Multi-homed
multi-homing
Multi-path
Multi-stream
Multi-streaming
multicast
Multicast 453
multicasting
multihomed
multihoming
Multimedia
Multimon
multiple
Multiple-byte
Multiple-streams
Multiplexing
Multiplexor
Multiplicative
multiplicity
Multiprotocol
mutually
Mview
MX
Myricom
- N -
n
n log n
N-copies
Nagle
name
named.hosts
named.rev
NAMESERVER
NANOG
NAP
NASA
NAT
NATs
NC-SI
NCC
NCP
NCS
Necessary
neighbor
net
net-directed
NetBIOS
netbios_dgm
netbios_ns
netbios_ssn
netid
Netids
Netlogger
netmask
Netnod
Netscape’s Cooltalk
NetSCARF
Netscount
netstat
netwall
NetWare Core Protocol (NCP)
network
Network monitoring devices (monitor or probes)
Network service access point
Network-LSAs
Network-specific
Network-wide priority
networked
Networking
networks
Neurochip
Neustar
never
Newer
Newspaper
Next-hop
NFS
NFSPROC_CREATE
NFSPROC_GETATTR
NFSPROC_LINK
NFSPROC_LOOKUP
NFSPROC_MKDIR
NFSPROC_READ
NFSPROC_READDIR
NFSPROC_READLINK
NFSPROC_REMOVE
NFSPROC_RENAME
NFSPROC_RMDIR
NFSPROC_SETATTR
NFSPROC_STATFS
NFSPROC_SYMLINK
NFSPROC_WRITE
NFSspy
NFSv2
Niche
NICNAME
NIST
NIT
NMAP
NMF
node
node-local
Nodes
Nokia
Nomadic
non
non-local
non-profit
non-routable
nontransitive
norm
Normally
NorrNod
North
not friendly
Notation
note
Notes
Nothing
Notification
Notify
Novell
NRL
NS
NSAP
ntp
NTTP
Null
null RR
number
Number (6 bits)
Number portability
numbers
nv
NXT
Nätverk
Nätverk och kommunikation
offered
- O -
Official
Official minimum MTU
offset
OK
Olivetti
olle.svenson
omits
One-to-many
Opcode
open
open-architecture
OpenDNS
OpenOffice/LibreOffice
operates
Operation
Operator
operator-neutral
Operators
opportunistic exchange of messages
Optical
optimistic
Option
Option Data (n octets)
Option Data Length (8 bits)
Option Type (8 bits)
optional
Optional data
options
Oral
ORCHID
order
ordered
Organization
organization-local
Organization-Local scope
Originally
OS
OSI
OSPF
OSPF Common Header (see
OSPF Database Description packet (see
OSPF Link state acknowledgement packet
OSPF Link State Advertisement general-header
OSPF Link state request packet
OSPF Link state update packet
OSPF Link state update packet (see
OSPF OSPF
OSPF-TE
ostinato
Otherwise
Out-of-band
Outbound
Outdoors
outline
Overvåking
Overvåking i en rettstat in the series Nordisk årbok i rettsinformatikk
OVF
owner
- P -
P
PacBell
Packages
packet
packet streams
packet-switched
Packets
pad
Pad1 == a null byte
Page
PAN
Paper
parallel
Parameter
Parameters
parses
Participants
participate
particpants
Particular
Partners
passive
path
path vector
path-vector
Pathchar
Paths
Patrik Fältström
Patterns
PAWS
payload
PC
PC-to-Telephone
PCC
Pchar
PCI
PCs
PDA
PDML
peak
peer-to-peer
PEM
People
per flow
per packet
per-destination-address
Percentage
Performance
perhaps
periodic
periodic 1/s
periodically
Perl
permanent
persist
personal
Personal monitoring
pessimistic
Petabit per second
Peter Ford
Peter Lothberg
PGM
PGP
Phase
Phone
Physical
Piggyback
piggybacked
PIM
PIM-dense
PIM-DM
PIM-SM
PIM-sparse
ping
plagiarism
planning
PLDM
Please
plen
plot
Plug and Play
PMAPPROC_DUMP
PMAPPROC_GETPORT
PMAPPROC_SET
PMAPPROC_UNSET
PMIPv6
PMTU
PMTU…
pNFS
point
Point-to-point
point-to-point tunnels (PPTP)
Pointer
Pointer Defined
pointer record
Points
policy
Policy-based
policy-based routing
Policy-based Virtual
poor
PopC
port
Possible
POST
Postal
Postfix
Postfix Postfix
PostScipt fonts
potential
Potentially
POTS-Internet
Power
PPP
Practical
Pragma
Pre-sensing
precede
Precedence
predictable
Predicting
Prediction
prefix
Prefixes
Premises
presence
Preserving
Pretty
primary
priority
Privacy-Enhanced
private
proactively
Probably
Probe
Probes
problems
procedure
Processing
produce
Product
program
Projected
promiscuously
promote
Properties
Propose
Proposed
prosumers
Protect
Protection Against Wrapped Sequence Numbers (PAWS)
protocol
protocol 6
Protocol Identifier
protocols
provide
Provide information specific to a particular routing protocol
Provided
provider
Providing
Provisional
PROWAY-LAN
Proxy
Pseudo-header
PSH
PSIRP
PTMP
PTR
PTYPE
Public
Public key
Publish
Publish/Subscribe
Publishing
Puget
purely
Purpose
Push
PVR
PX
- Q -
Q
QoS
QoS Routing
qotd
quarterly
queries
Query
Question
Questioning
Queue
QUIC (Quick UDP Internet Connections)
quotation
Quote
- R -
R
RADB
Radio
Radio Scanner
RADIUS
raison d’être
random
randomly
Range
RARP
rate
read
Readily
Readiness
Reading
real-time
Real-Time Data (rtdata) tree
Realm-Local scope
Reassembled
Rebinding
receipt
receive
receiver
Receiver-advertised
receivers
recommended
Reconfigure
Record
recv
recvfrom
RED
Redfish
Redirect
Redirection
Redistribution
reduce
reduces
Redundant
Reed
Refcnt
Referer
refreshed
Region
Regional
Register
registration
Regulating
relative
Relatively
reliability
reliable
Relies
Remaining
Remember
remote
Removed
Rename
rendezvous
Renewal
renting
replacing
Replicating
reply
Representational
represents
Request
request-line
Request-reply
Requested
Requests
Requests for Comments (RFCs)
required
requires
Requires Subnet
research
Researcher
Researchers
resequences
reserved
Reserved Anycast IDs -
reserves
Resolver
Resource
Response
Responsible Person
Responsive
REST
Resulting
retime
Retransmission
return
Reveals
Reverse
Review
RFC
RFCs
RH
Ring
Ringvägen
RIP
RIP message format
RIP-1
RIP-2
RIPE
RIPv1
RIPv2
RIPv2 message format
RIR
rlp
RMON
roaming
Ronquitst
root
Round
Round-trip
route
Route Defined
Route Flap
routed
router
Router-intelligent
Router-LSAs
routers
Routers/switches
routes
Routine
routing
Routing Information Protocol (RIP)
Routing Table Statistics Generator
RP
RP Interface ID (RIID)
RPB
RPC
Acronyms and Abbreviations
TCP, HTTP, RPC, NFS, X: Outline
Remote Procedure Call (RPC)
Port Mapper
NFS protocol, version 2 (RFC 1094)
TCP, HTTP, RPC, and NFS, X, ... - Summary
RPF
RPM
RPSL
RST
rsvd
RSVP
RSVP RSVP
RT
RTCP
RTCP packets
RTO
RTP
RTPmon
RTT
RUDE
Rui
rwnd
Réseaux IP Européens (RIPE) Network Coordination Centre (NCC)
- S -
S-HTTP
SACK
SAN
SANs
SAP
Sarnoff
SATAN
Save
scalability
Scania
school-zone
Scientific
sclient
scollect
scook
Scope
Scoped information neutrality
Scoping
screend
scserver
SCTP
sd
SDH
SDN
SDP
Seamless
Search
Search by image
searching
Second
secondary
Secure
Secured
securelib
security
See
segment
Segmentation
segments
self-clock
send
sender
sending
Sends
sendto
Sent
Separation of functions
sequence
Serial
server
Servers
Service
Service Advertising Protocol (SAP)
Session Initiation Protocol (SIP)
set
SETATTR
Seth Robertson
setsockopt
setting
SHA-1
sharing
shelf space
shown in red
shows
shutdown
SIG
Sign
signaling
Signalspaning
Signalspaning för polisiära ändamål
Signs
silence
similar
Similarily
Similarly
simple
Simple Mail Transfer Protocol
Simple_UDP_client-example2.c
Simple_UDP_server-example2.c
Simpler
Simplification
simplified
Simultaneous
Simultaneous bindings
single
Single path
Single-byte
Singularity
Sink
SIP
site-local
Site-Local scope
SiteScope
SITIC
Situational
Size
Skip
SLA
Sliding
SLIP
slow
slow-start
Smart
SmartBadge
SMASH
SMBIOS
smtp
SNA
SNAP
snmp
snmp-trap
SNMPv1
SNMPv2
SNMPv2u
SNMPv3
SNUS
SOA
SOAP
sock
socket
sockets
SOCKS
SOCKsv5
Soft
Software
SOL-IX
SolCom
Solicitation
Solicited
Solution
Solutions
solves
someone
SONET
SonicBlues
SOU
source
source address
Source-based
Source-specific
Source-specific multicast (SSM)
sources
Spam
sparse
Spatial
SPDM
special
Specialized
Specific
Specifically
specified
SPI
Spirent
SPIT
split
Splits
Sponsored
spreadsheets
Sprint
src
SRP
SRTP
SRV
ssize_t
SSL
SSM
SSN
ST
stable
Standard
Standardization
Standardized
Stanford Clean Slate Seminar
Stanford University
Start
Start Of Authority
Started
State
stateful
stateless
Statements
Static
Statistics
Statistics for individual HTTP connections
status
status-line
STCP
Steiner
Steve Casner
Steve Deering
STHIX
still
Still Responsive
Stockholm D-GIX
Stockholms University
Storage Area Networks (SANs)
stream
Stream Control Transmission Protocol (SCTP)
stream identifier (SI)
Stream Sequence number (SSN)
stream sequence number(SSN)
streams
Strict
Strong
stub
Study
stupid
subnet
subnet-directed
Subnet-Router
subnetid
Subnetmask
Success
successor
Sum
Summary
Summary-LSAs
SUN
SUNET
SUNET-KI
sunrpc
Supplementary
support
supporting
supports
SVR4
Sweden
Sweden’s FRA
Swedish
Switch/Routers
switched
switching
Syllabus
Symbol
SYN
Synchronization
Synchronize
syslog
systat
System
Systems
- T -
t
T.120
T/TCP
T1
Tables
Tag
take off
talk
Tampere University of Technology
Taxonomy
TCAM
TCB
TCP
TCP port
TCP UDP
TCP/IP
TCP_NODELAY
tcpdump
tcptrace
tdg
TDP
TechCrunch
technically
Technische Universität Braunschweig
Telecom
telecommunication
telecommunication operator
Telegrafstyrelsen
Telephone-to-PC
Telephone-to-Telephone
Telepresense
Telesys gk
Telia
Tells
telnet
telnet/rlogin
telnet/rlogin/
Telstra Corp. (Australia)
temporary/experimental
Terabit per second
Terminate
Terminate Incoming
Terminates
Ternary
testrig
Text
Text Defined
tftp
Theo Kanter
Theoretical
things
Third
thrown
thus
TIME
Time To Live (TTL)
Time-outs
timed
Timeline
timeout
Timestamp
TISSEC
TLA
TLD
TLI
today
Token
tools
Top
Topics
Topologies
TOS
total
traceroute
traces
Tracks
traditional
Traditionally
Traffic
transaction
transit
transitive
Translate
Transmission
Transmission Control Protocol (TCP)
Transmission sequence number (TSN)
Transmit
transmitted
transport
trap
Treat
Trends
Treno
TRILL
Trivial
Trossen’s Tussle Internet
truncated
trust
trusted
trying
tshark
TSN
TTL
TTL ≤ 1
Tunnel
tunneling
Turing
TUT
Twitter
TXT
type
Type=0
Type=1
Type=10
Type=11
Type=14
Type=192
Type=2
Type=3
Type=4
Type=6
Type=7
Type=9
Types
Typical
Typically
- U -
U
U. S. National Science Foundation
U.S
U.S. Homeland Security Department
U.S.’s NSA
u=1
UAC
UBR
UDP
UDP port
udp-socket-example6.c
udp-socket-server-example6.c
UDPgen
UG
UGH
UH
UK
ULA
UMTS
unassigned
Unauthorized
Understand
Understanding
unexplained
Unfair
Unfeasible
Unfortunately
Unicast
Unified
uninterested
unique
uniquely
United
United States of America
Universal
university
Unix
unless
Unlike
Unordered
Unreadable
Unrecognized
unreliable
Unresolvable
unrestricted
Unsolicited
Unspecified
unused
Update
updated
Updating
Upgrading
Upward-demultiplexing
Upward-multiplexing
URG
Urgent
URI
URL
US
US letter
Usability
usable
USB
use
Use Note
Useful
user
User data
User Datagram Protocol (UDP)
User-Agent
Users
uses
Uses HTTP
using
USM
Usually
Utilizes
UUID
- V -
V
VACM
VAD
Value
VAN
Van Jacobson
VANET
VANETs
VANs
variable-length
variance
Various
Vassilis
vat
vBNS
VCI
Vehicle
Vehicle Area Networks (VANs)
Vehicles
Vehicular
Vendor
VER
verification
verifier
Verisign
version
versus
via
video
Videos
View-based
VIF
Virtual
virtual private network (VPN)
Virtual Terminal Protocol
visibility
Vision-2
Vision-3
Visiting
visitor
Visualizing
VitalQIP
VLR
VLSM
Voice
Voice over IP (VoIP)
VoIP
VoIP Forum IA 1.0
Volume
VPLS
VPN
VPNs
VRF
- W -
W
W3C
Walled
WAN
Warm
Warning
Warnings
WASHMS
wb
WBEM
WDM
Weak
weakest
Web
Web 2.0
Web-enabled
webNFS
WebRTC
weighted
Welcome
well-known
Well-Known Service
WFQ
what
Where
Who
whois
Whose
Wi-Fi
WIDE
Wideband Network
widely
Wietse Venema
wikis
Wind
window
Wired Magazine
wireless
Wireless LAN (WLAN)
wireless/wired/mobile
Wireshark
Withdraw
without
WKS
WLAN
Work
works
World
World-class
World-wide-web
Worldwide
WPAN
Write
writing
Written
WSACleanup
WSAStartup
WTO
WWAN
WWGD
WWW
WWW-Authenticate
- X -
X
X.25 Networks
X11
X25
X25 Defined
xclock
XDR
Xerox
XID
xinetd
XML
XNS
XoJIDM
xplot
Xterm
- Y -
- Z -
Z
Zimbabwe
zone
Zoom
Zoom Meeting
zoomed
zoomed histogram
Zotero
~16 TCP connections
~5 bits/second
“Future of the Internet”
Fine tuning the index Example index from Internetworking course