AAAA

The AAAA DNS system record maps an IPv6 address to a specific host (FQDN).

ABR

The Available Bit Rate (ABR) service type is used primarily for traffic that is not time sensitive and don't need service level guarantees.

Access Point

An access point is a device or interface that connects users to other users within the network. It can also serve as the point of interconnection between the WLAN and a fixed wire network.

The number of required access points depends on the number of network users and the area the network covers.

Access Token

An Access Token is a secure string used in OAuth to provide a client with access to resources. The access token is issued to to clients that have a valid authorization grant.

Access Control List

An Access Control List (ACL) is an table containing permissions for a particular service or device, defining access to objects and allowed operations.

ACS

An Auto Configuration Servers (ACS) is a server used for automatic device and user provisioning and configuration through TR069.

ADPCM

Adaptive Differential Pulse-Code Modulation (ADPCM) is a differential pulse-code modulation variant where the size of quantization ranges is modified with a scaling factor before encoding. This means that the bandwidth requirements are reduced.

ADSL

Asymmetric digital subscriber line (ADSL) is a DSL technology providing network traffic over copper wires.

ADSL is slower than VDSL, with up to 24 Mbit/s downstream and 3.3 Mbit/s upstream speeds.

Ad SPECification

An ADvertisement SPECification (ADSPEC) is a part of an RSVP PATH message which contains information from network devices between a sender and receiver.

Typically the message allows advertise supprted services, availability and transmission information.

Assured Forwarding

Assured Forwarding (AF) is a mechanism for assurance of delivery, given a defined rate.

In case of congestion, traffic that exceeds the rate have a higher probability of being dropped.

The four AF classes have the same priority. For each class, packets are given a drop probability.

Drop probability Class 1 Class 2 Class 3 Class 4
Low AF11 AF21 AF31 AF41
Medium AF12 AF22 AF32 AF42
High AF13 AF23 AF33 AF43

AFTR

An Address Family Transition Router (AFTR) is a server implementing the Dual-Stack Lite to provide IPv4 to IPv4 communication over IPv6.

Authentication Headers

Authentication Headers is a protocol for integrity and origin authentication of IP packets.

Airtime

In wifi networks, airtime is the time spent transmitting and receiving data.

Devices with a slower transmission rate need longer time to transmit a set data volume than devices with a higher transmission rate. This means that airtime is not a reliable measure of how much data has been transmitted.

AMPDU

An Aggregated MAC Protocol Data Unit - AMPDU - is an aggregation of MPDUs.

AMSDU

An Aggregated MAC Service Data Unit is an aggregation of MSDUs.

Access Point Isolation

With Access Point Isolation, all Access Points in a network are prevented from communicating directly with each other.

AP Steering

Access Point steering allows the device to route traffic to the best available Access Point, as determined by network probing values.

ApDex

Apdex (Application Performance Index) is an open standard that defines a standard method for reporting and comparing the performance of software applications in computing.

More Information

More information is available at http://www.apdex.org/

API

The term API stands for Application Programming Interface.

It is the way a computer program talks to another computer program. APIs has traditionally been the domain of software developers. A program uses a library someone else supplies. This is something that has been greatly extended with the arrival of the Internet. It is possible, and very common, that one computer program uses the services from another computer program and that they are connected through a network. This is often referred to as Service Oriented Architecture, SOA.

A specific case is obviously services available on Internet. The computer that offers the API is a server and the program that uses the service is a client. The supplier doesn't have to know anything about the client. All it needs to do is to reply on specific questions that the clients ask.

These services will be released independently of each other; they do not form a large monolithic lump. They are probably developed using different tools, different languages and by different teams. There are many differences but a common denominator is the way they communicate. They offer an API that others may or may not use through a network. A common property is also that they don't have a user interface.

SOAP APIs

A SOAP API is defined as a standardized communication protocol for XML-based message exchange. SOAP can use different protocols like HTTP or JMS. IN SOAP, all parameters the server needs to be able to respond to should be a in a W3C standardized XML format and part of the body in the request.

REST APIs

REST web services encode most parameters in the request URI, instead of an XML. Data is encoded in the URI or as request parameters, where encoding is not standardized by W3C.

Application Performance Management

Application Performance Management - APM - is monitoring and management of application performance.

Example products are AppDynamics, DynaTrace and New Relic.

APN

An Access Point Name (APN) is the name of a gateway between a mobile network providing access to Internet.

ARP

Address Resolution Protocol (ARP) is a protocol for mapping an Internet Protocol address (IP address) to a physical machine address that is recognized in the local network.

ASCII

American Standard Code for Information Interchange - ASCII - is a character encoding standard representing a basic set of 128 characters as seven-bit integers:

0-9, a-z, A-Z, (space), basic punctuation, and some legacy control codes.

Asterisk

Asterisk is a software PBX that handles calls betwen telephones and connections to PSTN and VoIP services.

Airtime Fairness

ATF feature addresses the issue where low-speed data transfers impact high-speed data transfers.

Airtime Fairness gives equal amounts of air time (instead of equal number of frames) to each client regardless of its theoretical data rate. This will ensure higher download speed to latest devices when slower devices are connected to the same AP. This is done to prevent slower devices from penalizing faster devices by monopolizing network traffic.

In effect this means that Airtime Fairness improves the speed for faster devices by making the slowest devices even slower. This may allow better Quality of Service for faster devices, and should be negligible for the slower devices in most cases.

Using band steering in combination of Airtime Fairness can further improve results.

ATM - Asyncronous Data Transfer Mode

ATM - Asyncronous Data Transfer Mode is a protocol for high-throughput data traffic and streaming.

Authorization Grant

The Authorization Grant is an OAuth credential representing the resource owner's authorization to access a resource. It consists of either user login credentials or a refresh token.

Authorization Request

An Authorization Request is an OAuth request from a client to access a resource. It consists of an HTTP POST message identifying the client and providing credentials for authorization.

Authorization Server

The Authorization Server is an OAuth term referring to the server handling authentication and authorization an providing the client with access tokens for access to resources.

Authentication

The process of Authentication means identifying a user and making sure they are who they claim to be. Typically, it is followed by an authorization process.

Authoritative DNS

The Authoritative DNS is part of a DNS server. It contains the DNS data - information about the network IP addresses and DNS names.

Authorization

The process of Authorization entails providing a user with the correct access rights / permissions to allow them to perform actions in a system. Typically, it follows the authentication process.

Auto-Negotiation

Auto-negotiation is a method in Ethernet where two devices agree on the best performance transmission mode they both support.

Average

The average is the the arithmetic mean - the sum of a set of values divided by the number values.

More information: https://en.wikipedia.org/wiki/Arithmetic_mean

Back-Off

Back-Off is a method for decreasing the frequency of retransmissions of request in order to avoid congestion and collision.

Band Steering

Band steering allows the device to determine if a connected client is dual-band capable. If so, the client can be forced to use the less congested 5GHz network.

This is done by blocking the client from connecting to the 2.4GHz network.

Bandwidth

The bandwith is is a measure of network capacity. It indicates the bit rate capacity.

Base64

Base64 is a method to convert binary data into a string of ASCII characters for storage and transmission in environments designed to handle text rather than binary data. Each base64 character represents exactly 6 bits of data. The string length must be a multiple of 4 (which might require padding).

Basic Authentication

Basic Authentication is an authentication method using an username and password* to validate the client. Optionally, a domain may also be required.

It can be used together with WS-Security to validate traffic.

Beamforming

Beamforming is technique used for radio signals to improve quality and performance. It is done by creating multiple signals and finding the best paths, thereby “shaping” the antenna output to provide minimum interference.

Bit Error Rate

The Bit Error Rate (BER) is the percentage of transmitted bits which contain errors.

Bit Rate

The bit rate is a measure of traffic speed in a network. It indicates the number of bits per second transmitted.

Bitswap

Bitswap is a methoid for adjusting the number of bits allocated to channels. Congested channels are assigned fewer bits, and available channels are allocated more bits.

Bitwise OR

Bitwise OR is a binary calculation where you take the value of two bits and if both are 0, the result is 0. If either is 1, the result is 1.

For example, when calculating an IP broadcast address, the In other words, take the host's IP address, and set to '1' any bit positions which hold a '0' in the subnet mask.

BOSH

Bidirectional-streams Over Synchronous HTTP (BOSH), also called HTTP Binding, is a technique designed for asynchronous XMPP communication between client and server using HTTP.

BOSH uses a multiple request/response pairs for communication, and has a Connection Manager entity which handles the HTTP requests between clients, and for server communication.

BSS

The basic service set (BSS) is the basic building block in a wireless LAN. It is a set of all stations that can communicate with each other. Every BSS has an identification (ID) called the BSSID, which is the MAC address of the access point servicing the BSS.

CA

A Certificate Authority (CA) is an entity that issues digital certificates which guarantee that a public key is owned by the certificate subject, verifying their identity.

Certificates typically include the owner's public key, the expiration date of the certificate, the owner's name and other information about the public key owner.

CATV

Community Antenna TeleVision (CATV), or “cable TV”, is a system of delivering television programming radio frequency (RF) signals transmitted through coaxial cables or fiber-optic cables.

CBR

The Constant Bit Rate (CBR) service type is used for applications that transport traffic at a constant bit rate, where time synchronisation between source and destination is important, providing predictable response times and a static amount of bandwidth.

CCMP

CCMP – CTR mode with CBC-MAC Protocol is based on the Advanced Encryption Standard (AES) cipher along with strong message authenticity and integrity checking.

CDMA

Code division multiple access (CDMA) is a radio communication standard, where several transmitters can send information simultaneously over a single channel.

CDN

A Content Delivery Network - CDN - is a service providing delivery of content through a network of distributed data centers.

The goal of a CDN is to serve content to end-users with high availability and high performance.

Cell (DSL)

DSL cells are ATM data encoded into small, fixed-sized packets (frames).

CHAP

Challenge Handshake Authentication Protocol (CHAP) is a method used to authenticate PPP sessions.

CHAP uses a randomly generated string as a unique challege phrase for each authentication. This is combined with device host names and hash functions so that no static secret information is sent.

Checksum

A checksum is a value used as an error control mechanism. It works by calculating a sum for the data using a predefined algorithm, and then comparing the result to some expected value, or the checksum itself. If the result is not as expected, this indicates that something has gone wrong in transmission.

Continuous Integration

Continuous Integration (CI) is a development practice that requires developers to integrate code into a shared repository several times a day. Each check-in is then verified by an automated build, allowing teams to detect problems early.

The main aim of CI is to prevent integration problems.

Cipher

A WiFi security cipher is the method through which a connection is secured against intrusion.

For information about cipher strings, see https://www.openssl.org/docs/manmaster/apps/ciphers.html.

Circuit ID

A Circuit ID is a unique identifier assigned to a network connection between two locations.

Classful QDisc / Packet Scheduler

A Classful QDisc is a Quality Of Service function containing classes. The classes may contain other QDiscs, which in turn can be classful or classless.

CLR

Cell Loss Ratio (CLR) is the percentage of network cells that do not arrive at their destination.

CNAME

The CNAME (Canonical Name Record) is a DNS system record identifies the domain name as an alias for a “master”, or a “canonical (FQDN).

CNAME records must always point to another domain name, never directly to an IP address.

Codec

A coder-decoder (codec) is a method for encoding or decoding digital data streams or signals. It uses various algorithms to encode data for transmission or storage, or decodes encoded data for use.

Com2Sec

Com2Sec is a security protocol and access method for SNMP management.

Companding

A compressing-expanding (companding) is a method for managing dynamic range in channels with limited dynamic range. It compresses the dynamic range of a signal transmission and expands it at the receiving end, according to the defined.

Congestion

Network congestion is when the traffic volume in the network becomes so large it affects the trasnmission and delivery of data packets, thereby causing a reduced quality of service.

Connection Bytes

Connection Bytes is a filtering property that matches packets only after the specified number of bytes has been transfered through the connection.

CORS

Cross-Origin Resource Sharing - CORS - is a mechanism for allowing restricted resources (CSS stylesheets, images, and scripts) to be accessed across domains even when they originate inside scripts.

This mechanism gives web servers cross-domain access controls, which enable secure cross-domain data transfers.

Modern browsers use CORS in an API container - such as XMLHttpRequest or Fetch - to mitigate risks of cross-origin HTTP requests.

More Information

CPE

The term Customer-Premises Equipment (CPE) is used in TR069 and refers to devices in a network that is located in the premises of a subscriber.

CPU

The CPU value indicates how much of CPU processing power is being used.

%CPU

The CPU percentage for a process indicates how much of CPU processing power is being used.

CRC

Cyclic Redundancy Check (CRC) is a method for discovering errors in data transmission by verifying the received data against an attached check value.

Cron Log Level

The Cron Log level determines how much information to display or write to file when creating system logs.

Level
Everything
High Verbosity
Low Verbosity
Executions and Errors
Only Errors

Critical Rendering Path

The Critical Rendering Path is the minimum set of events that must happen to display the initial view for a webpage.

Content Receive Time

The Content Receive Time is a measure of the time needed to receive the response content data.

CRUD HTTP Methods

Most database operations can be described using the acronym CRUD. You Create data, you Read data, you Update and finally you Delete data.

These operations describe the lifecycle of data in a database. RESTful web services (almost) map CRUD operations using the HTTP verbs GET, PUT, POST, PATCH and DELETE.i

The mapping between CRUD operations and HTTP verbs isn't perfect. Read and Delete are easy, these operations are mapped by GET and DELETE, but Create and Update is more problematic.

A common mapping is:

CRUD operation HTTP Verb
Create PUT with a new URI
POST to a base URI returning a newly created URI
Read GET
Update PUT with an existing URI
PATCH
Delete DELETE

The exact behavior varies with the exact RESTful service.

Class Selector

The Class Selector (CS) is used by Differentiated Services as a precedence code point value that maps to a Differentiated Services Code Point. It is backwards compatible with IP precedence values.

Client-Side Certificate

Digital certificates provided by clients in SSL/TLS can be used as authorization tokens by verifying the certificate authenticity.

Client Side Monitor

A Client Side Monitor runs on the client side and measures a number of parameters and sends them to a collector to generate monitoring metrics.

CSS

Cascading Style Sheets - CSS - is a method for adding style (fonts, colors, spacing, layout) to documents, most commonly (X)HTML.

Definition

The definition of a CSS element consists of a selector tag and a definition block describing the formatting.

The selector (an element type, a unique ID or a class) identifies the HTML element that the formatting applies to.

The declaration block starts with {, ends with } and contains one or more declarations.

Each declaration consists of a CSS property name followed by a colon and the value for the property. Each declaration ends with a semicolon.

Examples

An element type selector:

p {
    text-size: 14px;
}

An ID selector:

#name {
    color: red;
}

A class selector:

.class {
    text-align: center;
}

More information

For more information, see W3Schools.com

CSSOM

The Custom Style Sheet Object Model - CSSOM - is tree structure consisting of nodes representing the CSS styling for an (X)HTML or XML document.

It is used to create the styling for a document, typically by a web browser.

Each node is an object that can be accessed separately and manipulated to change the visual representation.

The CSSOM is used together with the DOM to display web pages.

Custom Events

Custom Events are external events such as maintenance windows, power outages and other events that could help explain to the user why performance was affected.

Data Package

A data package is a portion of data that transmitted between a source and destination in a network, normally of larger size.

DDM

Digital diagnostics monitoring (DDM) is a feature for SFP parameter monitoring in a device.

Dynamic DNS (DDNS or DynDNS)

Dynamic DNS (DDNS) is a method for automatically providing DNS servers with up to date information about configured hostnames and addresses.

DDOS

A Distributed Denial of Service attack is a type of Distributed Denial of Service attack where multiple compromised systems are used to attack a single target system.

Decoding

Decoding is the process or method of transforming encoded data into a clear text, typically a set of readable characters or the original format.

DECT

DECT - Digital Enhanced Cordless Telecommunications is a European standard for cordless telephone systems over radio.

In the United States a slightly different radio frequency range is used, and it is called DECT 6.0.

Delay

Network delay is a network characteristic indicating how long it takes for a piece of data to travel across the network.

DER

Distinguished Encoding Rules - DER - is an encoding method for converting data to a a binary string.

Device Flags

The Device Flags field shows information about the physical device.

DFS

Dynamic Frequency Selection (DFS) means that the wireless radio automatically selects the least congested wifi channel to use.

DHCP lease

A DHCP Lease is a DHCP reservation of a particular IP address provided to a client by a DHCP server. It is called lease because it expires after a certain amoutn of time (usually 24 hours).

Before the lease expires, the DHCP server should renew the lease or provide a new lease.

DHCP Options

When sending DHCP requests, additional options can be requested by providing a space separated list of codes.

Configuration

Code Description
0 Pad.
1 Subnet Mask.
2 Time Offset(deprecated).
3 Router.
4 Time Server.
5 Name Server.
6 Domain Name Server.
7 Log Server.
8 Quote Server.
9 LPR Server.
10 Impress Server.
11 Resource Location Server.
12 Host Name.
13 Boot File Size.
14 Merit Dump File.
15 Domain Name.
16 Swap Server.
17 Root Path.
18 Extensions Path.
19 IP Forwarding enable/disable.
20 Non-local Source Routing enable/disable.
21 Policy Filter.
22 Maximum Datagram Reassembly Size.
23 Default IP Time-to-live.
24 Path MTU Aging Timeout.
25 Path MTU Plateau Table.
26 Interface MTU.
27 All Subnets are Local.
28 Broadcast Address.
29 Perform Mask Discovery.
30 Mask supplier.
31 Perform router discovery.
32 Router solicitation address.
33 Static routing table.
34 Trailer encapsulation.
35 ARP cache timeout.
36 Ethernet encapsulation.
37 Default TCP TTL.
38 TCP keepalive interval.
39 TCP keepalive garbage.
40 Network Information Service Domain.
41 Network Information Servers.
42 NTP servers.
43 Vendor specific information.
44 NetBIOS over TCP/IP name server.
45 NetBIOS over TCP/IP Datagram Distribution Server.
46 NetBIOS over TCP/IP Node Type.
47 NetBIOS over TCP/IP Scope.
48 X Window System Font Server.
49 X Window System Display Manager.
50 Requested IP Address.
51 IP address lease time.
52 Option overload.
53 DHCP message type.
54 Server identifier.
55 Parameter request list.
56 Message.
57 Maximum DHCP message size.
58 Renew time value.
59 Rebinding time value.
60 Class-identifier.
61 Client-identifier.
62 NetWare/IP Domain Name.
63 NetWare/IP information.
64 Network Information Service+ Domain.
65 Network Information Service+ Servers.
66 TFTP server name.
67 Bootfile name.
68 Mobile IP Home Agent.
69 Simple Mail Transport Protocol Server.
70 Post Office Protocol Server.
71 Network News Transport Protocol Server.
72 Default World Wide Web Server.
73 Default Finger Server.
74 Default Internet Relay Chat Server.
75 StreetTalk Server.
76 StreetTalk Directory Assistance Server.
77 User Class Information.
78 SLP Directory Agent.
79 SLP Service Scope.
80 Rapid Commit.
81 FQDN, Fully Qualified Domain Name.
82 Relay Agent Information.
83 Internet Storage Name Service.
84 N/A
85 NDS servers.
86 NDS tree name.
87 NDS context.
88 BCMCS Controller Domain Name list.
89 BCMCS Controller IPv4 address list.
90 Authentication.
91 Client-last-transaction-time.
92 Associated-ip.
93 Client System Architecture Type.
94 Client Network Interface Identifier.
95 LDAP, Lightweight Directory Access Protocol.
96 N/A
97 Client Machine Identifier.
98 Open Group's User Authentication.
99 GEOCONF_CIVIC.
100 IEEE 1003.1 TZ String.
101 Reference to the TZ Database.
102-111 N/A
112 NetInfo Parent Server Address.
113 NetInfo Parent Server Tag.
114 URL.
115 N/A
116 Auto-Configure
117 Name Service Search.
118 Subnet Selection.
119 DNS domain search list.
120 SIP Servers DHCP Option.
121 Classless Static Route Option.
122 CCC, CableLabs Client Configuration.
123 GeoConf.
124 Vendor-Identifying Vendor Class.
125 Vendor-Identifying Vendor-Specific.
126 - 127 N/A
128 TFPT Server IP address.
129 Call Server IP address.
130 Discrimination string.
131 Remote statistics server IP address.
132 802.1P VLAN ID.
133 802.1Q L2 Priority.
134 Diffserv Code Point.
135 HTTP Proxy for phone-specific applications.
136 PANAAuthentication Agent.
137 LoSTServer.
138 CAPWAP Access Controller addresses.
139 OPTION-IPv4_Address-MoS.
140 OPTION-IPv4_FQDN-MoS.
141 SIP UA Configuration Service Domains.
142 OPTION-IPv4_Address-ANDSF.
143 OPTION-IPv6_Address-ANDSF.
144 - 149 N/A
150 TFTP server address.
150 Ether boot. GRUB configuration path name.
151-174 N/A
175 Ether boot.
176 IP Telephone.
177 Ether boot. Packet Cable and Cable Home.
178- 207 N/A
208 pxelinux.magic (string) = F1:00:74:7E (241.0.116.126).
209 pxelinux.configfile (text).
210 pxelinux.pathprefix (text).
211 pxelinux.reboottime (unsigned integer 32 bits).
212 OPTION_6RD.
213 OPTION_V4_ACCESS_DOMAIN.
214-219 N/A
220 Subnet Allocation.
221 Virtual Subnet Selection.
222-223 N/A
224-254 Private use.
255 End.

DHCP Options

When sending DHCP requests, additional options can be requested by providing a space separated list of codes.

Code Description
0 Pad.
1 Subnet Mask.
2 Time Offset(deprecated).
3 Router.
4 Time Server.
5 Name Server.
6 Domain Name Server.
7 Log Server.
8 Quote Server.
9 LPR Server.
10 Impress Server.
11 Resource Location Server.
12 Host Name.
13 Boot File Size.
14 Merit Dump File.
15 Domain Name.
16 Swap Server.
17 Root Path.
18 Extensions Path.
19 IP Forwarding enable/disable.
20 Non-local Source Routing enable/disable.
21 Policy Filter.
22 Maximum Datagram Reassembly Size.
23 Default IP Time-to-live.
24 Path MTU Aging Timeout.
25 Path MTU Plateau Table.
26 Interface MTU.
27 All Subnets are Local.
28 Broadcast Address.
29 Perform Mask Discovery.
30 Mask supplier.
31 Perform router discovery.
32 Router solicitation address.
33 Static routing table.
34 Trailer encapsulation.
35 ARP cache timeout.
36 Ethernet encapsulation.
37 Default TCP TTL.
38 TCP keepalive interval.
39 TCP keepalive garbage.
40 Network Information Service Domain.
41 Network Information Servers.
42 NTP servers.
43 Vendor specific information.
44 NetBIOS over TCP/IP name server.
45 NetBIOS over TCP/IP Datagram Distribution Server.
46 NetBIOS over TCP/IP Node Type.
47 NetBIOS over TCP/IP Scope.
48 X Window System Font Server.
49 X Window System Display Manager.
50 Requested IP Address.
51 IP address lease time.
52 Option overload.
53 DHCP message type.
54 Server identifier.
55 Parameter request list.
56 Message.
57 Maximum DHCP message size.
58 Renew time value.
59 Rebinding time value.
60 Class-identifier.
61 Client-identifier.
62 NetWare/IP Domain Name.
63 NetWare/IP information.
64 Network Information Service+ Domain.
65 Network Information Service+ Servers.
66 TFTP server name.
67 Bootfile name.
68 Mobile IP Home Agent.
69 Simple Mail Transport Protocol Server.
70 Post Office Protocol Server.
71 Network News Transport Protocol Server.
72 Default World Wide Web Server.
73 Default Finger Server.
74 Default Internet Relay Chat Server.
75 StreetTalk Server.
76 StreetTalk Directory Assistance Server.
77 User Class Information.
78 SLP Directory Agent.
79 SLP Service Scope.
80 Rapid Commit.
81 FQDN, Fully Qualified Domain Name.
82 Relay Agent Information.
83 Internet Storage Name Service.
84 N/A
85 NDS servers.
86 NDS tree name.
87 NDS context.
88 BCMCS Controller Domain Name list.
89 BCMCS Controller IPv4 address list.
90 Authentication.
91 Client-last-transaction-time.
92 Associated-ip.
93 Client System Architecture Type.
94 Client Network Interface Identifier.
95 LDAP, Lightweight Directory Access Protocol.
96 N/A
97 Client Machine Identifier.
98 Open Group's User Authentication.
99 GEOCONF_CIVIC.
100 IEEE 1003.1 TZ String.
101 Reference to the TZ Database.
102-111 N/A
112 NetInfo Parent Server Address.
113 NetInfo Parent Server Tag.
114 URL.
115 N/A
116 Auto-Configure
117 Name Service Search.
118 Subnet Selection.
119 DNS domain search list.
120 SIP Servers DHCP Option.
121 Classless Static Route Option.
122 CCC, CableLabs Client Configuration.
123 GeoConf.
124 Vendor-Identifying Vendor Class.
125 Vendor-Identifying Vendor-Specific.
126 - 127 N/A
128 TFPT Server IP address.
129 Call Server IP address.
130 Discrimination string.
131 Remote statistics server IP address.
132 802.1P VLAN ID.
133 802.1Q L2 Priority.
134 Diffserv Code Point.
135 HTTP Proxy for phone-specific applications.
136 PANAAuthentication Agent.
137 LoSTServer.
138 CAPWAP Access Controller addresses.
139 OPTION-IPv4_Address-MoS.
140 OPTION-IPv4_FQDN-MoS.
141 SIP UA Configuration Service Domains.
142 OPTION-IPv4_Address-ANDSF.
143 OPTION-IPv6_Address-ANDSF.
144 - 149 N/A
150 TFTP server address.
150 Ether boot. GRUB configuration path name.
151-174 N/A
175 Ether boot.
176 IP Telephone.
177 Ether boot. Packet Cable and Cable Home.
178- 207 N/A
208 pxelinux.magic (string) = F1:00:74:7E (241.0.116.126).
209 pxelinux.configfile (text).
210 pxelinux.pathprefix (text).
211 pxelinux.reboottime (unsigned integer 32 bits).
212 OPTION_6RD.
213 OPTION_V4_ACCESS_DOMAIN.
214-219 N/A
220 Subnet Allocation.
221 Virtual Subnet Selection.
222-223 N/A
224-254 Private use.
255 End.

DHCP Pool

A DHCP pool is a collection of IP addresses available for DHCP allocation.

The Pool Start number is the first available number in the pool.

The Pool Size is the count of available numbers, counting from the pool start.

Example: with Pool Start of 50 and a Pool Size of 100, the available pool addresses are 50 to 150.

DHCP Relay

A DHCP Relay is a server acting like a proxy for DHCP requests. It receives the request forwards them to another DHCP server, and relays the response back to the client.

DNS Server

A DHCP server is a server that provides IP addresses to clients on the a network.

See also: Domain Name System.

DHCP

DHCP – Dynamic Host Configuration Protocol

A device can be used as a DHCP server to automatically assign an IP address to each computer or device on a network.

DCHP is used for both ipv4 and ipv6.

Dial Plan

A dial plan defines what sequence of digits need to be dialled in the private branch exchange to get access to specific calling networks or enable other features.

Differentiated Services

Differentiated Services (DiffServ) is a method for classifying traffic and providing quality of service for IP networks.

DiffServ uses a differentiated services code point in the IP header for packet classification purposes.

DLNA

Digital Living Network Alliance (DLNA) is designed to act as a bridge between media and device. It needs either a wired or a wireless network.

Discrete MultiTone Modulation

Discrete MultiTone Modulation is a modulation method where the available bandwidth is divided into a large number of channels. Data is allocated to maximize the throughput of every channel. Channels that can't carry data are not used, and the bandwidth reallocated.

DMT is the technology which divides the whole bandwidth on the telephone line into lots of sub-channels and then controlling these 'virtual modems' as one together in order to get higher speeds.

DMZ

DMZ (demilitarized zone) is used to provide an extra layer of security. It's a network added between a protected network and an external network.

DNS Server

A Domain Name System Server runs networking software containing a database of network names mapping them to IP addresses, typically on the Internet.

DNS Translation File

A DNS Translation File consists of a list of DNS name pairs, consisting of a match and a replacement. When the file is used, the match is converted to the replacement, which is then passed to the resolver.

Special characters can be used in the match:

Character Usage
?  Wildcard for a single character.
*  Wildcard for multiple characters.
 #  Comment.

Note: Wildcards can only be used in the match, not the replacement.

Example

Example of DNS translation file contents:

# Translation File
www.*tester.com www.pure-tester.com
mail?.google.com mail.google.com

DNS

The Domain Name System (DNS) is a hierarchical decentralized naming system for computers, services, or any resource connected to the Internet or a private network.

Dnsmasq

Dnsmasq is an application providing various network services such as DNS forwarding, DHCP, router advertisement and network boot.

DNSSEC

The Domain Name System Security Extensions - DNSSEC - a set of extensions to DNS which provide some security aspects to DNS resolvers.

DNSSEC works by digitally signing records for DNS lookup using public-key cryptography.

DOM

DOM events are events that occur during DOM traversal and parsing.

Event Description
loading  The browser has received the document and is now about to do something with it.
interactive  The browser has finished parsing all of the HTML and DOM construction is complete.
content loaded  Both DOM and CSSOM](/glossary/c/cssom) are ready, render tree can be built, and Javascript can be executed.
complete  Processing is complete and all resources have been downloaded.

DOM

The Document Object Model - DOM - is tree structure consisting of nodes representing the contents of an (X)HTML or XML document.

It is used to create the visual representation of the document, typically by a web browser.

Each node is an object that can be accessed separately and manipulated to change the visual representation.

Domain Name Matching

Domain matching is used to verify if a certificate matches the domain, by comparing the certificate with the domain.

There are three modes for comparison:

Mode Description Comment
 Basic The certificate SAN/CN must match the Domain.  
 Lenient  At least one domain in the list must match.  
 Strict All domain names in the list must match exactly.  

Domain Name

A domain name is typically a name that identifies a resource on the internet with an IP address, according to the Domain Name System.

DOS

A Denial of Service attack is a cyber-attack where the attacker tried to make a service unavailable by overloading network resources or processor capabilities by flooding the service with traffic.

DCPM

Differential Pulse-Code Modulation (DPCM) is a signal encoding method that uses pulse code modulation as a baseline and then compares nearby values to encode a difference instead of a fixed value.

Dropping

Dropping is when a packet is deliberately dropped due to congestion or other reasons, such as quality of service rules.

DS-Lite

Dual-Stack Lite (DS-Lite) is a method for sharing of IPv4 addresses by combining IPv4-in-IPv6 and NAT.

DSCP

A Differentiated Services Code Point (DSCP) is a 6-bit code point in the differentiated services field (DS field) inside the packet IP header.

It is used by Differentiated Services for classification purposes to provide quality of service functionality.

DSL Mode

The DSL mode indicates the operation of a DSL line.

DSL

DSL – Digital Subscriber Line is a way of providing high bandwidth data communication through regular copper telephone lines.

DTMF Mode

The DTMF mode is a setting that governs how Dual Tone Multi Frequency signalling is to be performed.

Mode Description
Compatibility Use RFC2833 by default but switch to inband when reciever does not support RFC2833.
RFC2833 Send DTMF information as RTP messages.
SIP INFO Send DTMF information as SIP messages.
Inband DTMF tones are generated by the calling device.

DTMF

Dual Tone - Multi Frequency (DTMF) is a signalling method for telephone systems, which uses a set of eight audio frequencies transmitted in pairs to represent 16 signals, represented by the ten digits, the letters A to D, and the symbols # and *.

DUID

The DHCP Unique IDentifier – DUID – is a unique identifier associated with each client and server in a DHCP environment. The DUID should be permanently stored and not changed.

Duplex

The term duplex indicates how traffic is performed. It can be either:

  • Half - only one side can communicate at a time.
  • Full - both sides can communicate with each other simultaneously.

Dwell Time

The dwell time is the amount of time spent on each channel in the hopping sequence when hopping from channel to channel.

Ethernet Auto Power Down

Ethernet Auto Power Down allows the hardware ports to be turned off automatically when not in use.

ECC

Elliptic Curve Cryptography - ECC is an encryption method for public key to create relatively small keys.

EDNS

Extension mechanisms for DNS - EDNS - is a specification for expanding the size of several parameters of the Domain Name System DNS protocol.

EDNS adds information to DNS messages in the form of pseudo-resource-records included in the “additional data” section of a DNS message in both requests and responses.

EDNS is needed for DNS Security Extensions.

EEE

Energy-Efficient Ethernet (EEE) is a technology for allowing for less power consumption during periods of low data activity.

Encoding

Encoding is a process or method of transforming data into a different format, typically a sequence of bytes or other character streams.

Encryption

Encryption is the process of encoding a message or information in such a way that only authorized parties can access it.

Endpoint

And endpoint is a message destination .

It can be part of a target URL (including the port number).

For example, for the following URL:

	http://maps.googleapis.com/maps/api/geocode/xml?address=Rio&sensor=false

the endpoint is

http://maps.googleapis.com

EoA

Ethernet over ATM (EoA) is a protocol using PPP to provide an DSL Internet connection over ATM.

ESP

Encapsulating Security Payload (ESP) is a security protocol for network data in IPv4 and IPv6 networks.

Ethernet

Ethernet a family of computer networking technologies commonly used in LANs.

Communication over ethernet consists of data frames. Each frame contains source and destination addresses, and error-checking data.

EVDO

Evolution-Data Optimized (EVDO) is a standard for broadband Internet through wireless data transmission.

Execution Mode

The execution mode defines how URLs are accessed.

Mode Description
parallel / p URLs are called without waiting for each other.
sequential / s Each URL is accessed one at a time.

Parallel mode, is the normal mode for a modern browser. The URL elements of each subsequent page will load at the same time. There is no waiting for a particular URL to be completed before moving on to the next.

In sequential mode only one URL will load at a time. Each call will wait for the previous ULR before moving on.

Failover

Failover means switching over to a different network when the selected network cannot be accessed.

FAT32

FAT32 is an older file system compatible with a wide range of devices. It has an upper limit on disk size 2TB of and file size of 4GB.

FEC - Forward error correction

Forward error correction entails encoding the signal with redundant information that can be matched to discover errors in the transmission.

File System

The file system is a specification of how data is stored on a drive and what types of information can be associated with the files and directories.

Firewall Action

The firewall action defines how traffic is handled by the firewall.

Item Description
ACCEPT Allow the traffic.
REJECT Refuse the traffic.
DROP Ignore the traffic.
FORWARD Pass the traffic along.

Firewall group

A firewall group is a collection of IP addresses that have the same firewall rules.

Firewall Zone

A firewall zone is a grouping of WiFi or network interfaces, with a common set of firewall rules.

Flow Control

Ethernet flow control is a mechanism for temporarily stopping the transmission of data on Ethernet family computer networks.

The goal is to regulate traffic in order to prevent packet dropping.

Flow Specification

A flow specification defines data traffic contents and requirements, and is used by devices to decide how to handle packets on the network. It consists of two parts - a Traffic SPECification, which describe traffic parameters an a Request SPECification that defines requirements for the flow.

Form-based Authorization

Form-based authorization uses a form to provide username and password (or other credentials) which is handled by dedicated processes in the backend.

FQDN

The Fully Qualified Domain Name (FQDN) is the complete domain name for a specific computer, or host, on the Internet. The FQDN consists of two parts: the hostname and the domain name.

Frame

In networking, a frame is a unit of data, consisting of addressing and synchronization information around a payload with data to be transmitted.

Frames of smaller size are often encapsulated in larger frames.

Gateway metric

The gateway metric is used for routing decisions, and is added to routing tables to enable routing decisions.

Gateway

A gateway is a node in a network that provides interconnectivity between networks of different types.

For a basic Internet connection, the gateway provides Internet access to the local network.

Genmask

A genmask is the netmask for the destination net. For example 255.255.255.255 for a host destination and 0.0.0.0 for the default route.

GPRS

General Packet Radio Service (GPRS) is a mobile data service for mobile communication over 2G and 3G.

GRE

Generic Routing Encapsulation (GRE) is a multipurpose tunneling protocol using IP networks to encapsulate a number of different network layer protocols.

GSM

Global System for Mobile Communications (GSM) is a standard for protocols for digital cellular networks used by mobile phones.

GSSAPI

The Generic Security Service Application Program Interface - GSSAPI - is an API for programs to access security services. It does not provide security in itself, but makes it possible to connect different implementations, typically as security software libraries.

HAR File

The HTTP Archive format - HAR - is a JSON-formatted archive file format for logging of a web browser's interaction with a site. The common extension for these files is .har.

Typically data about timings is stored and can be used to generate a waterfall graph:

  • Time to fetch DNS information
  • Time for each object request
  • Time to connect to server
  • Time to transfer assets from the server to the browser of each object

HAR files can be generated by most browsers.

HATEOAS

HATEOAS, is an acronym for Hypermedia as the Engine of Application State. It means that clients only interact with applications through dynamic hypermedia provided by servers.

Clients only need a generic understanding of hypermedia to interact with services. Basically it is the server allowing another server to discover how to interact, rather than having it defined beforehand.

Keep-Alive Efficiency

The HTTP Keep-Alive Efficiency value measures the efficiency of the HTTP protocol keep-alive option.

It indicates the percentage of reused network connections, measured over all users and URL calls.

Host ID

A host ID is an IPv6 label assigned to a network device used to identify the device in the network for addressing purposes.

Hostname

A hostname is an IPv4 label assigned to a network device used to identify the device in the network for addressing purposes.

HOSTS file

A Hosts file is a text file containing mappings of hostnames to IP addresses, overriding DNS resolution, or used as backup when DNS isn't available.

Header Receive Time

The Header Receive Time indicates the time it takes to receive the remaining data of the HTTP response header, measured since the first byte of the response header was received.

HSPA / HSPA+

High Speed Packet Access (HSPA) is an extension of 3G mobile networks utilizing WCDMA.

Evolved High Speed Packet Access (HSPA+) is a furhter improvement on HSPA allowing for higher speeds.

HT Capabilities

HT Capabilities are information about which data rates are supported by a device or network.

HTTP Body

An HTTP body is as the name implies the body of an HTTP request or response message, containing the bulk of the content of the message.

The body may consist of: * Request line contining the HTTP and target (GET /logo.gif HTTP/1.1 * Response status line, such as (HTTP/1.1 200 OK`) * Additional HTTP Headers * An empty line * Optional data in different types (plain text, JSON, XML, form data, or multipart files and so on)

HTTP Status Codes

200

Number Code
200 OK
201 Created
202 Accepted
203 Non Authoritative Information
204 No Content
205 Reset Content
206 Partial Content
207 Multi-Status

300

Number Code
300 Multiple Choices
301 Moved permanently
302 Moved Temporarily
303 See Other
304 Not Modified
305 Use Proxy
307 Temporary redirect

400

Number Code
400 Bad Request
401 Unauthorized
402 Payment Required
403 Forbidden
404 Not Found
405 Method Not Allowed
406 Not Acceptable
407 Proxy Authorization Required
408 Request Timeout
409 Conflict
410 Gone
411 Length Required
412 Precondition Failed
413 Request Too Long
414 Request-URL Too Long
415 Unsupported Media Type
416 Requested Range Not Satisfiable
417 Expectation Failed
419 Insufficient Space On Resource
420 Method Failure
422 Unprocessable Entity
423 Locked
424 Failed Dependency

500

Number Code
500 Internal Server Error
501 Not Implemented
502 Bad Gateway
503 Service Unavailable
504 Gateway Timeout
505 HTTP Version Not Supported
507 Insufficient Storage

HTTP Header

HTTP headers are fields that can be transmitted as part of HTTP request or response messages. They provide additional parameters or information for the transaction being performed.

An HTTP header consists of a field name for identification and a value containing the data.

More information is available at https://www.iana.org

HTTP Methods

Option Description
GET Retrieves information from the service.
POST Sends data to the service.
PUT Replaces current representations with the content.
DELETE Removes all current representations in the target URI.
HEAD Retrieves status line and header section only from the service.
OPTIONS Describes the communication options for the target.
TRACE Performs a loopback test for the path to the target resource.
PATCH Updates parts of the resource.

HTTP

Hypertext Transfer Protocol - HTTP - is a protocol network for distributed, collaborative, and hypermedia communication, mainly on the Internet (World Wide Web).

It is used to exchange or transfer Hypertext - structured text using links between nodes containing text.

HTTP/2

Hypertext Transfer Protocol 2 - HTTP/2 - HTTP/2 is a revision of the HTTP network protocol.

HTTP/2 uses the same methods, status codes, header fields, and URIs, as HTTP, but handles data frames and transport between client and the server differently.

The protocol promises increased request efficiency through minifying resources and performance gains through request prioritization, header compression and multiplexing.

HTTP/2 also allows servers to predict future requests and push data to the client beforehand.

HTTPS

Hypertext Transfer Protocol Secure - HTTPS is a protocol for secure network communication, mainly on the Internet.

HTTPS consists of communication over Hypertext Transfer Protocol, using Transport Layer Security, or Secure Sockets Layer for encryption.

IAID

The Interface Association Identifier – IAID – that is a binding between the interface and one or several IPv6 addresses. It is used in DHCPv6 servers togehter with with a DUID to identify IP allocations.

ICE

The Iopsys Communication Engine - ICE - client is an embedded client software that can be integrated into any device for connection to the cloud, enabling Internet of Things. It can be dynamically extended using plugins providing a non service interrupting installation of new applications.

Typical devices are Gateways, Smart Phones, Tablets and Web Cameras but it could be just about anything that should be part of “The Internet of Things”.

All ICE enabled devices connect to a cloud based XMPP infrastructure using an encrypted TCP tunnel.

The client allows for communication to the gateway using the XMPP cloud infrastructure from anywhere at any time through the encrypted TCP tunnel.

The communication works behind any NAT and also provides for file transfers and proxy tunnel communication.

ICMP

The Internet Control Message Protocol (ICMP) is used to send error messages about services or device status.

Identity Provider

An Identity Provider - IdP - is an server providing user authentication through the use of security tokens, for example SAML 2.0 or OAuth.

Typically, an identity provider is used by one or several Service Providers to enable users to access services.

Identity Store

Identity stores are used to store certificates that identify an instance.

On request, they certificates from these stores are transmitted to other parties which use them for identification.

IGMP Proxy

An Internet Group Management Protocol (IGMP) Proxy is a setting to enable the device to handle IGMP host tasks such as sending membership and leave group membership reports to groups.

IGMP Snooping

IGMP snooping is the process of listening to IGMP network traffic to determine which paths are associatied with which IP multicast streams, and allow management of the multicast traffic.

IGMP

IGMP – Internet Group Management Protocol is a communications protocol used on IPv4 networks to establish multicast group memberships.

Infrastructure monitoring

Infrastructure monitoring is monitoring of server and middleware performance metrics.

Examples of metrics is CPU utilization, Memory usage, Disk Usage etc.

Inotify

Inotify (inode notify) is a subsystem to detect changes to the filesystem, and report those changes to applications.

Interface Protocol Type

The Interface Protocol Type defines the interface basic type and direction.

Overview

Unmanaged

The interface protocol type Unmanaged means that the connection has no defined protocol.

Interface Protocol

The Interface Protocol setting defines the protocol/behavior for an interface.

Protocol Description
Unmanaged No defined protocol.
Static Address Static IP address.
DHCP v4 Retrieve IPv4 address through DHCP
DHCP v6 Retrieve IPv6 address through DHCP
PPP PPP interface.
PPP over Ethernet PPPoE interface.
PPP over ATM PPPOA interface.
3G PPP over GPRS/EVDO/CDMA/UMTS
4G 4G interface over LTE / HSPA+.
Point-to-Point Tunnel PTPT interface.
IPv6 Tunnel in IPv4 6in4 interface.
IPv6 Tunnel in IPv6 6to4 interface.
IPv6 rapid deployment 6rd interface.
Dual Stack Lite DS-lite interface.
PPP over L2TP PPP over L2TP.

Interface Type

The Interface Type defines the base settings for the interface.

Configuration

Type Description
Standalone Not requiring hardware.
Any WAN Any WAN interface.
Bridge Network bridge.

IntServ

Integrated Services (DiffServ) is a method for classifying traffic and providing quality of service for IP networks.

Compared to DiffServ, it allows for more detailed traffic flow management.

The basic principle for IntServ is that each application requiring service guarantees makes reservations from all implementing routers in the network.

IntServ uses RSVP messages within the network to reserve capacity. The reservations are described in a FlowSpec.

I/O

Input/output - IO - is any process involving communication and transfer of data between a information processing system and other systems, peripherals, or other information processing systems.

Iopsys

Iopsys stands for Inteno Open Platform System. It combines the efficiency and power of the SOC (System on Chip) with the OpenWrt open source distribution. It further enables the operator to leverage on the modularity of OpenWrt to integrate new applications to the CPE.

IOT

The Internet of Things - IoT - is a term for the networking of physical with each other, through a number of protocols, domains, and applications, allowing devices to be controlled remotely across the network.

IO Wait Time

The IO Wait Time value represents the the time a CPU spends waiting for I/O operations to complete. Examples of things that influence this value are available physical memory, disk usage, fragmentation, file system efficiency and buffer sizes.

IP Address

An Internet Protocol address (IP address) is a numerical identifier for a device address.

IPv4

Internet Protocol Version 4 - IPv4 - is the first major version of the Internet Protocol.

IPv6

Internet Protocol Version 6 - IPv6 - is the the successor to IPv4.

IP Datagram

A IP datagram is a unit of data transmitted using the IP protocol, following a specific format which describes various aspects of the datagram, its source and its destination.

The IPv4 datagram consists of the following headers and fields:

Bits Name Description
4 VERS  IP version number 0100 (4) or 0110 (6).
4 HLEN  Header length in 32-bit words, so if the number is 6, then 6 x 32 bit words are in the header i.e. 24 bytes. The maximum size is 15 x 32-bit words which is 60 bytes. The minimum size is 20 bytes or 5 x 32-bit words.
8 Type of Service The TOS field.
16 Total Length  is the number of octets that the IP datagram takes up including the header. The maximum size that an IP datagram can be is 65,535 octets.
16 Identification  The Identification is a unique number assigned to a datagram fragment to help in the reassembly of fragmented datagrams.
3 Flags  Bit 0 is always 0 and is reserved. Bit 1 indicates whether a datagram can be fragmented (0) or not (1). Bit 2 indicates to the receiving unit whether the fragment is the last one in the datagram (1) or if there are still more fragments to come (0).
13 Frag Offset  in units of 8 octets (64 bits) this specifies a value for each data fragment in the reassembly process. Different sized Maximum Transmission Units (MTUs) can be used throughout the Internet.
8 TTL  the time that the datagram is allowed to exist on the network. A router that processes the packet decrements this by one. Once the value reaches 0, the packet is discarded.
8 Protocol  Layer 4 protocol sending the datagram, UDP uses the number 17, TCP uses 6, ICMP uses 1, IGRP uses 88 and OSPF uses 89.
16 Header Checksum  Header checksum error control.
?? IP Options  Optional field for testing, debugging and security.
?? Data  Packet contents, actual data.
?? Padding  Optionally, padding is added to make the datagram into multiples of 32 bits.

IP ECN

The IP Explicit Congestion Notification (ECN) field is part of the IP TOS IP header field.

It is used to signal that the network is, or is about to, experience congestion.

A device can use the ECN field to mark a packet instead of dropping it. The receiver of the packet repeats the ECN back to the sender, which can reduce the transmission rate.

ECN uses the two last bits of the TOS field encode four different codepoints:

Binary Value Description
00 Non-ECT Non ECN-Capable Transport.
10 ECT(0) ECN Capable Transport.
01 ECT(1) ECN Capable Transport.
11 CE Congestion Encountered.

IP in IP

IP in IP is an method to provide data tunneling by encapsulating one IP packet in another IP packet, using header information.

IP Precedence

IP precedence is a method to assign priority to data packets by using part of the Type of Service field in the IP datagram header.

With IP precedence, the first three bits of the TOS field is used to provide one of eight possible precedence values.

Binary Value Priority
000 (0) Routine
001 (1) Priority
010 (2) Immediate
011 (3) Flash
100 (4) Flash Override
101 (5) Critical
110 (6) Internetwork Control
111 (7) Network Control

IP Quality of Service Algorithm

The IP Quality of Service Algorithm determines which type of QoS to provide.

Strict Priority Precedence means that where the the packets with the highest priority always are sent first.

Weighted Fair Queuing means that bandwidth is adjusted automatically according to traffic priority and weight value.

IP TOS

The IP Type of Service (TOS) field (also known as DiffServ or DSCP field) is a part of an IP datagram header, originally meant to describe the purpose of a datagram.

It is used by Differentiated Services for the DiffServ Code Point, and the optional Explicit Congestion Notification.

IP

The Internet Protocol - IP - is the primary communication protocol used on the Internet, typically used together with TCP.

IPv4

Internet Protocol Version 4 - IPv4 - is the first major version of the Internet Protocol.

IPv6

Internet Protocol Version 6 - IPv6 - is the the successor to IPv4.

IPoE

Internet Protocol over Ethernet (IPoE) is a protocol to provide an DSL Internet connection over Ethernet, by directly encapsulating the data in Ethernet frames.

IP Route

Iproute2 is a collection of Linux utilities for handling routing, network interfaces, tunnels, traffic control, network-related device drivers, and other aspects.

IPsec

Internet Protocol Security - IPsec - is a suite of protocols for authentication and encryption of network traffic through Security Associations, Authentication Headers, Encapsulating Security Payloads, and ISAKMP.

IPtables

Iptables is a firewall application that uses configured tables to determine firewall rules and routes.

IPTV

Internet Protocol Television (IPTV) delivers television services over IP networks as a streaming service.

IPUI

International Portable User Identity (IPUI), is a unique identifier for each DECT Handset, allowing it to be assigned a SIP identity. The identifier is a 10-digit (40-bit) hexadecimal code

IPv4 Address

An IPv4 address is an IP address represented as four groups separated by a period. Each group consists of decimal numbers between 0 and 255.

An example of an IPv4 address is 192.168.22.12.

IPv4 Broadcast Address

A Broadcast Address is an special values in the host-identification part of an IP address.

It is used to sending data multiple recipients at the same time, for example to allow one device to comunicate with all other devices on the network at once.

The device sends its messages to the broadcast address, and the network hardware propagates it to every other device in the group (the broadcast domain).

Calculation

The broadcast address for an IPv4 host is calculated through bitwise OR using the subnet mask and the host IP address.

Example: For broadcasting a packet to an entire IPv4 subnet using the private IP address space 172.16.0.0/12, which has the subnet mask 255.240.0.0, the broadcast address is 172.16.0.0 | 0.15.255.255 = 172.31.255.255.

The IP broadcast address 255.255.255.255 is limited to use for the local (zero / 0.0.0.0) network. Traffic to this address is not forwarded to other networks.

IPv4

Internet Protocol Version 4 - IPv4 - is the first major version of the Internet Protocol.

IPv6 Address

An IPv6 address is an IP address address represented as eight groups separated by colons (:). Each group contains four hexadecimal digits.

An example of an IPv6 address is 2011:09bd:583a:0000:8a2e:0000:0370:7334.

IPv6

Internet Protocol Version 6 - IPv6 - is the the successor to IPv4.

ISAKMP

Internet Security Association and Key Management Protocol - ISAKMP - is a protocol for establishing Security Associations and cryptographic keys Internet.

It provides a framework for authentication and exchange of security keys that is not dependent on a particular implementation.

Iterative Resolver

An Iterative Resolver is part of a DNS server. It navigates the DNS tree to find any available DNS data in order to determine which domain name resolves into what particular IP address.

The resolve process is done through iteration. The resolver starts from the top - the root domain, and works its way through the DNS tree until it receives an answer.

All data received during a query is placed in the resolver cache. The data remains cached according to Time-To-Live.

IUP

Inteno Universal Provisioning (IUP) is a technology for automatic delivery of service configuration and device settings.

Jitter Buffer

A jitter buffer is storage for voice packets so they can be sent out in evenly spaced intervals used to reduce jitter, providing better transmission reliability.

There are two jitter buffer implementation types which are used by the SIP channel reciever.

Implementation Description
Fixed Use a fixed buffer size.
Adaptive Use a variable buffer size.

Jitter

Jitter is variations in packet arrival time, which may be caused by network congestion, timing delays, or changed routes.

JSON

JavaScript Object Notation - JSON - is a language independent data-interchange format. It aims to be easy for humans to read and write while maintaining a strict structure to enable simple machine parsing and creation.

More information is available at http://www.json.org/

Syntax

JSON consists of objects, consisting of a key and a value.

Keys must be strings, written with double quotes: ``

Values must be one of the following:

  • an other JSON object
  • a double-quoted value:
    • a string
    • a number
    • an array
    • a boolean
    • null

Example:

snippet.json
{
  "Coonfig": {
    "Version": "V5.5-F",
    "configurationEnabled": "false",
    "pmaPort": "26401",
    "pmaNetworkProtocol": "2",
    "pmaRequestTimeoutSeconds": "60",
    "useHttpProxy": "false",
    "httpProxyPort": "0"
  }
}

JUCI

JUCI (Java User Control Interface) provides a command line and graphical user interface for administration of devices.

Kerberos

Kerberos is a protocol for network authentication using tokens to allow devices to communicate over non-secure networks.

Keystore

For information about how to create a keystore, see the documentation for the java keytool command in the Java documentation

KPI

A Key Performance Indicator (KPI) is a measurable value that demonstrates how effectively a company is achieving key business objectives.

L2TP

Layer 2 Tunneling Protocol (L2TP) is a protocol used to support VPNs, where security is provided in the transmitted packages rather than in the tunneling.

LAN

LAN – Local Area Network is a number of connected units within a limited area, typically a building.

Latency Path

The DSL Latency Path comes in three modes: Path 1 (Fast), Path 2 (Interleaved) and Both 1 & 2. Fast is used for applications sensitive to delay. Interleaved suits applications sensitive to errors.

Latency

Latency is the time it takes for a packet of data to get from source to destination, normally measured by performing a round-trip test: sending a packet that is returned to the sender.

LCP

The Link Control Protocol (LCP) is part of the Point-to-Point Protocol and is used to set up the PPP connection.

Lease Time

Client lease time or lease time is the length of time a local device retains an IP address.

LLC

The logical link control (LLC) layer provides multiplexing to enable different network protocols to coexist and be transported over the same network medium.

Load Balancing

Load balancing distributes traffic over multiple networks to provide an even load on each WAN interface.

Load Distribution

Load distribution means that the generation of load is distributed over several data centers.

Load Test

A load test generates transactions to the targeted application with the intention to verify how the application reacts to a specific load.

Logging Level

The Logging level determines how much information to display or write to file when creating system logs.

Error messages come with a identifying level tag which makes it possible to filter out messages according to severity.

Level
Emergency
Alert
Critical
Error
Warning
Notice
Info
Debug

Loop Attenuation

Loop Attenuation is a measure of the quality of the line - how much the signal weakens over the loop.

Attenuation is measured in Decibel (dB). A value betwen 20dB-45dB can be considered normal.

LSAP

Link Service Access Point (LSAP) fields are used to identify which protocol handler should process an incoming frame.

LSAP fields allow the receiving node to pass each received frame to an appropriate device driver which understands given protocol.

LTE

Long-Term Evolution (LTE) is a standard for high-speed wireless communication for mobile phones and data terminals, based on GSM and UMTS.

MAC

A Media Access Control (MAC) address is a unique identifier for physical network interfaces.

Masquerading

Firewall masquerading entails modifying addressing to allow devices to communicate with the WAN without being visible externally. To the external network, all traffic will look as originating from the gateway.

MBS

Maximum Burst Size (MBS) is the maximum size of cells that can be transmitted in direct sequence on a particular connection.

MCR

The Minimum Cell Rate (MCR) defines the lowest rate at which cells can be transported in an ATM connection.

Median

The median is the value which is in the middle between the higher and lower half of a set of values. The number of values above and below a median is the same.

More information: https://en.wikipedia.org/wiki/Median

MIB

A management information base (MIB) is used in SNMP to describe the management data structure, in the form of a hierarchical namespace containing object identifiers (OID). Each OID identifies a variable that can be read or set via SNMP.

Mime Type

A MIME type / (properly) media type / (aka) content type is a standardized two-part identifier for file formats and format contents transmitted on the Internet.

A media type consists of top-level type name and sub-type name, possibly ordered into trees, and optional parameters.

Syntax

top-level type name / subtype name [ ; parameters ]

top-level type name / [ tree. ] subtype name [ +suffix ] [ ; parameters ]

The top-level type names are:

application, audio, example, font, image, message, model, multipart, text, video.

The sub-type name consists of a media type name or other identifying content.

Examples

application/javascript
application/json
application/x-www-form-urlencoded
application/xml
application/zip
application/pdf
audio/mpeg
audio/vorbis
multipart/form-data
text/css
text/html
text/plain
image/png
image/jpeg
image/gif

MiniDLNA

MiniDLNA is media server for DLNA / UPnP clients.

MITM

The Man-In-The-Middle - MITM - is a method where a service is placed between client and server to allow recording of the traffic between them.

MITM can also be used as a a computer security attack where the attacker secretly relays traffic between sender and receiver in order to circumvent mutual authentication.

This allows the attacker to access, manipulate and modify the traffic without sender and receiver noticing.

MLD

Multicast Listener Discovery - MLD - is a protocol enables IPv6 routers to discover nodes able to receive multicast traffic.

The protocol discovers multicast addresses by regularly querying devices on the netwoek, which reply with membership reports containing information about multicast addresses and their states.

It also collects multicast requests from unlisted devices and adds or removes them as required.

MPDU

A MAC Protocol Data Unit - MPDU - is a message transmitted to and from Media Access Control devices.

MSDU

A MAC Service Data Unit - MSDU - is a unit of data transmitted to and from Media Access Control devices, containing the packet and additional link layer information.

MSS Clamping

Maximum Segment Size Clamping entails changing the maximum segment size of all TCP connections with a MTU lower than 1500.

MSS

Maximum Segment Size (MSS) is a TCP parameter specifying the largest byte size a a single TCP segment can contain for a device.

MTA

A Mail Transfer Agent - MTA - delivers mail to and from a domain.

MTOM

MTOM - Message Transmission Optimization Mechanism is a method of efficiently sending binary data to and from Web services.

For more information see MTOM at the W3C site

MTU

Maximum Transmission Unit (MTU) is the largest physical packet size that a network can transmit. Any packets larger than the MTU are divided into smaller packets before being sent. MTU is measured in bytes.

Multicast

Multicast is group communication where information is addressed to a group of destination computers simultaneously.

IP multicast is a method of sending Internet Protocol data messages to a group of interested receivers in a single transmission. It is often employed for streaming media applications on the Internet and private networks. The method is the IP-specific version of the general concept of multicast networking.

It uses specially reserved multicast address blocks in IPv4 and IPv6.

In IPv6, IP multicast addressing replaces broadcast addressing as implemented in IPv4.

MultiWAN

MultiWAN is a term for when a device is set up to use multiple WAN connections from an provided by one or several ISP:s.

Usually the goal is to improve reliability and bandwidth capability.

SOAP Must Understand

The SOAP Must Understand (mustUnderstand) attribute is used in SOAP headers to indicate if the entry is mandatory for processing.

A mandatory header must be processed by the receiver. If the header is not recognized, the request will fail with a SOAP fault.

MX

A Mail eXchanger - MX - record defines the destination for mail to the domain. This resource record is used by Mail Transfer Agent senders to route their traffic.

NAT Loopback

NAT loopback is a method using NAT to provide access to services via the public IP address from inside the local network.

NAT-PMP

The NAT Port Mapping Protocol (NAT-PMP) is a network protocol to automatically detect and determine the NAT gateways to configure NAT settings and port forwarding.

NAT

Network Address Translation (NAT) is a method to to device translate local network addresses into external addresses for the Internet.

NDP Relay

A NDP Relay is a server acting like a proxy for NDP requests. It receives the request forwards them to another NDP server, and relays the response back to the client.

NDP Status

The RFC 4861 defines a number of statuses:

Status Description Comment
INCOMPLETE Address resolution is in progress and the link-layer address of the device has not yet been determined.
REACHABLE Device is known to have been reachable recently (within tens of seconds ago).
STALE Device is no longer known to be reachable but until traffic is sent to the neighbor, no attempt should be made to verify its reachability.
DELAY Device is no longer known to be reachable, and traffic has recently been sent to the neighbor. Probes should be delayed in order to give upper-layer protocols a chance to provide reachability confirmation.
PROBE Device is no longer known to be reachable, and unicast Neighbor Solicitation probes are being sent to verify reachability.

NDP

The Neighbor Discovery Protocol - NDP - is an IPv6 protocol used for discovery and redirect similar to ARP and ICMP for IPv4.

It is used to handle address configuration, node discovery, address determination, duplicate addresses detection, location of available routers and DNS servers, address prefix discovery, and maintainance of reachability information.

Packets

Statuses

Neighbor Advertisement

Neighbor advertisements are NDP discovery messages announcing the IP addresses of the node, and are sent in response to a Neighbor Solicitation message.

In NDP, Neighbor Advertisement packets have the type 136.

Neighbor Solicitation

Neighbor solicitations are NDP discovery messages used to determine if a network neighbor is available at a cached address, or else request the actual network address.

In NDP, Neighbor Solicitation packets have the type 135.

Netmask

A netmask is a mask used to divide an IP address into subnets and specify the number of available host addresses in the subnet.

The netmask consists of a 32-bit sequence on the format 255.255.225.255.

There are three commonly used network classes:

Class Netmask length # of networks Number of hosts Netmask
Class A 8 126 16777214 255.0.0.0
Class B 16 16382 65534 255.255.0.0
Class C 24 2097150 254 255.255.255.0

The last 0 and 255 in a sequence are always assigned and cannot be used as host addresses.

For example, in 255.255.225.0, 0 is the assigned network address.

In 255.255.255.255, 255 is the assigned IPv4 broadcast address.

Network bridge

A network bridge combines two network segments into an aggregated network, making them behave as if they are one continuos segment.

Network interface

A network interface is the access point between a device and a computer network. A network interface can be either a physical connection or a software access address.

Network Profile

A network profile is a global setting for your device that defines how it will work in the network.

For example, selecting a particular profile may configure your device as a wireless repeater or as a fully routed NAT gateway.

Depending on the selected profile, available features and settings will be different.

Some sample profiles:

Profile Description
Bridged IPTV IPTV service in a bridged network.
VoIP + Bridged IPTV Both VOIP and IPTV service in a bridged network.
Wireless Repeater Wireless bridge.
Fully Routed (NAT) All features with NAT capability.

Network Redirect

Network Redirects are NDP messages sent by routers to indicate a better first hop for a particular destination.

In NDP, Network Redirect packets have the type 137.

Network Throughput

Network Throughput is the amount of network traffic generated, typically measured in megabits per second. This is a floating average value calculated over a set unit of time.

Next Hop

Next hop refers to the next closest device a packet can go through, according to the routing table.

NIC

A Network Interface Controller – NIC, is an hardware component that connects a device to a network.

Noise level

The WiFi Noise level is the amount of interference in your wireless signal, such as crosstalk, radio frequency interference, distortion, and so on.

It is measured in decibels from zero to -120, where a lower value is better.

Typical environments range between -100db and -80db.

Non-functional requirement

The non-functional requirements defines the requirements on how a IT system should perform in a production like environment.

A typical performance requirement is response time per page or transaction at a specific load.

NS

The Name Server record - NS - defines the delegation point. It states which name servers should be used by resolvers to obtain information about the domain.

NTFS

NTFS is a Windows-centric file system. The theoretical storage limit for NTFS is 16 Exabytes for 64-bit operating systems.

NTLM

Windows NT LAN Manager - NTLM - is a collection of security protocols that provides authentication, integrity, and confidentiality to users of Microsoft Windows-based environments.

NTLM authorization requires a user name in the \DOMAIN\USERNAME or \USERNAME format, password and, if necessary, domain.

NTP Mode

The NTP Server mode allows the device to act as a local NTP server even when losing connection to the providing NTP server.

NTP - Network Time Protocol

NTP is a networking protocol for clock synchronization between devices in networks.

OAuth

OAuth is an authorization method used to provide access to resources over HTTP/S. It works by providing access tokens representing a user permissions to access a resource. This token is used by a client to authenticate its requests.

There are two versions of OAuth: OAuth 1 which uses an HMAC-SHA signature strings, and OAuth 2 (using tokens over HTTPS.

OBSS Coexistence

Overlapping basic service sets (OBSS) is a setting that configures the BSS to allow coexistence between 20 MHZ and 40 MHZ overlapping basic service sets (OBSS).

ODHCPD

OpenWrt DHCP Daemon - odhcpd is a daemon used to provide server services for DHCP, RA, and NDP.

Open Resolver

An Open Resolver resolver is a DNS server that accepts DNS lookups from any client on the Itnernet, without authentication or authorization.

This makes the service vulnerable to the DNS Amplification Attack type of denial of service attack.

OpenWRT

OpenWrt is an open source distribution with an excellent overall user space environment, modular and flexible system design. It has a large and active development community.

More information:

More information and documentation is available at http://wiki.openwrt.org/.

OUI

An Organizationally Unique Identifier - OUI - is a 24-bit number used to uniquely identify a vendor.

Usually makes up the first three octets of the MAC address.

Outstanding Request

An outstanding request is any request still waiting for a response.

Overhead

Overhead is extra data or processing needed to manage delivery of a network data.

OSWD

The Open Web-Server Daemon - OSWD - handles web requests to the configuration framework. I allows access to device configuration services through the configuration framework.

Packet Aggregation

Packet aggregation means combining packets into larger units, in order to reduce the overhead associated with each transmission.

Packet Loss

When packets are transmitted in a network they may travel different routes from source to destination. This means there is no guarantee that packets will arrive in time or arrive at all. They may also be denied at the receiver due to a full buffer or other issues. A collective term this is packet loss.

Packet Scheduler / Queueing Discipline

A queueing discipline / packet scheduler is a network function that distributes available bandwidth to different connections according to an algorithm.

The management is done by deciding how many packets each connection is handed, by handling the device traffic queue and making prioritizing incoming/ingress or outgoing/egress packets.

The scheduling can be done either by automatically, based on observed traffic, or following rules according to a Quality Of Service protocol such as Intserv or DiffServ.

Packet

A packet is a portion of data that transmitted between a source and destination in a network. It normally a smaller part of some larger unit of data, which is tagged with an identification number and an address. When all packets for a specific data unit arrives at their destination, they are reassembled to form the original data.

Division into packets, transmission and reassembly is governed by a transmission protocol.

Packetization

Packetization is the process dividing data into packets for transmission according to a defined protocol.

Pairing

Pairing is the process of making two compatible wireless devices able to communicate with each other. This is normally done by making them visible to each other, and providing a PIN code for identification.

PAP

Password Authentication Protocol (PAP) is a method used to authenticate PPP sessions.

PAP works like a standard login procedure; using a static user name and password combination.

Pause Frames

Ethernet Pause Frames is a mechanism for flow control which is used to cause a temporary stop of transmission from the origin. Typically it is used when the sender temporarily or intermittently transmits faster than the device can receive.

The PAUSE frame is defined by IEEE 802.3x and uses MAC Control frames to carry the PAUSE commands. Ethernet pause frames are supported on full duplex only.

Note: If a port is over-subscribed, Ethernet Pause Frame flow control does not ensure no-loss behavior.

PBX

A Private Branch Exchange (PBX) is a switch used for connecting telephone devices or virtual applications in an organization. It manages internal communication in the network and provides access to the external public switched telephone network, and allows for sharing of lines and direct communication between internal devices.

PCM

Pulse-code modulation (PCM) is the standard method for digital audio. PCM entails converting analog signals to digital values by sampling the amplitude of the analog signal at set time intervals. Each sample is quantized to the nearest value within a range of digital steps. With PCM, the ranges vary with the source amplitude, so that the steps are larger at higher amplitudes.

PCM is defined by sampling rate (number of times per second that samples are taken) and bit depth (number of different digital values).

PCR

Peak Cell Rate (PCR) defines the highest rate at which cells can be transported in an ATM connection.

Peak Load

Peak load is the highest expected load on a system during shorter period of time.

The peak load is defined as transactions, pages, iterations or use cases per second.

PEM

Privacy Enhanced Mail - PEM - is an encoding method for converting binary data to a ASCII text string consisting of a header followed by base-64 data and a footer.

A PEM certificate file is a base-64 encoding of a DER certificate.

Periodic Inform

The Periodic Inform setting determines whether CPEs must periodically send information to the ACS.

PID

The PID – Process ID – is an unique idenitifer for a process, assigned to it when it is loaded into memory.

PIN

A Personal Identification Number - PIN - is a number used to authenticate a user similarly to a password, but only using numbers.

Ping

Ping is a network tool which tests accessibility of hosts on an Internet Protocol network. It measures how long a it takes for a message to travel from the measuring host to the destination and back.

PKCS

Public Key Cryptography Standards - PKCS - is a collection of public-key cryptography standards.

PKCS#11

The PKCS #11 standard defines a platform-independent API to cryptographic tokens, typically used for hardware security modules or smart cards.

PKCS#12

The PKCS#12 standard is a binary format for storing the server certificate, intermediate certificates, and the private key in one file, a PFX file (usually with th extension .pfx and .p12).

Plain Text

Plain Text format is a non-binary data format using only character codes, and some text control characters (line breaks, tabs) but no formatting information.

Typical encodings for plain text files are ASCII, UTF-8 or UTF-16.

PLC

Packet loss concealment (PLC) is a technique to mask the effects of packet loss in VoIP communications.

Traffic Policing

Traffic Policing is a QoS process where packets are handled according to user-defined criteria. Depending on the criteria, the packets may be marked, dropped or completely ignored.

The purpose of traffic policing is to make sure that bursts in traffic hare handled and the designated traffic flows get appropriate bandwidth.

PoP

A Point of Presence (PoP) is an access point to the Internet.

Port Forwarding

Port forwarding is a feature that forwards inbound traffic from the internet on a specific port (or ports) to a specific device (or port) on your local network (LAN).

Port Speed

Port speed settings affect how a LAN or WAN port negotiates the speed setting.

Negotiation can be turned off (speed setting: only) or use Autonegotiation (speed setting max) to determine actual speed.

Communication on a port can be either half or full duplex.

A port that is set to disabled does not handle any traffic.

Port

A port is a communication endpoint, identified by a number, which combined with an IP address provides the necessary addressing for a service on the network.

PPID

The PPID – Parent Process ID – is the PID of the process that started a particular process.

PPP

Point-to-Point Protocol (PPP) is a protocol for providing a direct data link connection with authentication, encryption and compression.

PPPoA

PPP over ATM (PPPoA) is a protocol using PPP to provide an DSL Internet connection over ATM.

PPPoE

PPP over Ethernet (PPPoE) is a protocol using PPP to provide an DSL Internet connection over Ethernet, by putting PPP frames inside Ethernet frames.

Precedence

The Precedence setting defines quality of service parameters relating to Class Selector and Assured Forwarding priority.

ID Setting
All Default
0 CS1, AF11, AF12
1 CS2, AF21, AF22
2 CS3, AF31, AF32
3 CS4, AF41, AF42
4 CS5, Voice-admit, EF
5 CS5
6 CS6
7 CS7

Prefix delegation

Prefix delegation is used in DHCPv6 to assign a network address prefix and automate configuration and provisioning of the public addresses for the network.

Preserve Value

The Preserve Value option allows you to save Reported Value for a check run with URL errors that are mapped to I, W, or E (and there is no selenium error).

By default a check run with URL errors is shown as a failed check run and the Returned Value is not saved.

Private Key

A private key is part of a cryptographic system for authentication and encryption using a private and public key.

The private key is kept secret and secure, and can be used to decrypt messages encrypted with the public key.

Protocol

A protocol is a set of rules for how to handle data, specifically for transmission and management. The sender and reciever noth use the same protocol to structure, send and receive it, ensuring that the data remains intact, readable and usable.

Proxy

A proxy server works as an intermediary between the client and other servers, forwarding traffic to and from the servers and client. I adds functionality for improving aspects of the connection, such as security, reliability or simplicity.

Page Response Time Client Side

The time it takes to for all calls that is done to for a specific web page including the time it takes to execute client side code and rendering a complete web page.

Page Response Time Server Side

The time it takes to for all calls that is done to render a web page.

PSDN

A packet-switched data network - PSDN - is a network where communication is done by transmitting and receiving data packets. Devices are note connected directly, but packets from different sources going to different destinations share transmission channels.

PSK

A Pre-Shared Key (PSK) is a shared secret which was previously shared between the two parties using some secure channel before it is used.

PSTN

The Public Switched Telephone Network (PSTN) is the publicly available network of telecommunication systems and services provided by telephone operators.

PTM Priority

The PTM Proprity defines how PTM traffic packets should be handled.

Priority Description
Normal Priority Send packets according to their priority.
High Priority Use preemption; lower-priority packets are paused when higher-priority packets are sent.

PTM - Pulse-Time Modulation

Pulse-Time Modulation means encoding traffic into a pulsing signal signal for transfer.

Point-to-Point Tunneling Protocol

Point-to-Point Tunneling Protocol (PTPT) is a technology for virtual private networks through TCP and a GRE with PPP packets.

PTR

A Pointer record - PTR - maps an IP address to a specific host (FQDN).

Public Key

A public key is part of a cryptographic system for authentication and encryption using a private and public key.

The public key that can be distributed freely, and can be used to verify that a message has been sent by the owner of the private key.

Queueing Discipline / Packet Scheduler

A queueing discipline / packet scheduler is a network function that distributes available bandwidth to different connections according to an algorithm.

The management is done by deciding how many packets each connection is handed, by handling the device traffic queue and making prioritizing incoming/ingress or outgoing/egress packets.

The scheduling can be done either by automatically, based on observed traffic, or following rules according to a Quality Of Service protocol such as Intserv or DiffServ.

QName

QNames are the qualified name of an element or attribute in XML content, and is used to identify and access them.

QoS Class

A QoS Class is a set of rules for various traffic settings that can be applied to data traffic to ensure particular needs for Quality of Service.

QoS Filter

A Quality Of Service Filter is used by classful QDiscs to determine which QoS Class a packet should belong to.

The filter contains a number of parameters/conditions that the packet needs to match in order to be enqueued in the appropriate class.

QoS Classification Group

A QoS Class group is a collection of QoS classes which can be added to an interface to provide a combination of settings.

QoS Mark

The Quality of Service Mark is used when classifying traffic. Packets matching the filter will be marked with the provided hexadecimal code 0x000000-0xFFFFFF.

This mark can then be used for identification and filtering purposes, for example by iptables .

QoS Scheduling

Scheduling is a QoS process when a packet scheduler decides to make a packet leave earlier than other packets.

QoS

Quality of Service (QoS) involves setting for data traffic that affect performance, allowing resources to be allocated depending on the needs of various types of traffic.

Quantization

Quantization of signals is a method where a signal is sampled at specified time intervals and the input values are approximated to provide a smaller set of values compared to the actual signal.

Query String

A query string is a part added to an URL resource to pass form data, options, settings or other parameters to the executing web service.

Syntax

In a typical implementation, parameters are indicated by this syntax:

Separator Parameter Assignator Value
 ?  name  =  value

Multiple parameters are separated with &.

Examples:

For the URL http://example.com/path/to/page, parameters could look like this:

http://example.com/path/to/page?name=value

http://example.com/path/to/page?first=this&then=that

RADVD

The Router Advertisement Daemon - radvd is an open-source software product that provides Neighbor Discovery Protocol services.

RAM

Random Access Memory - RAM - is the main memory available to applications. RAM is read/write and randomly accessible.

RAML

RAML is a REST API format based on YAML for service definition of RESTful interfaces. The file describes resources, actions/methods, query/header/path parameters, representations, and so on.

More information

For more information, see the RAML website.

Ramp-Up

Ramp-up means increasing the load up to a designated load value.

The time this takes to is called Ramp-Up Time, whereas Ramp-Up Rate is the rate of increase during this time period.

Record Resource Types

Resource records are used by Domain Name Systems to identify and manage domain data.

Each record has name, number, time to live, a class, and data specific to its type.

The transmission format for resource record is specified in RFC 1035.

This list of DNS resource record types is an overview of resource records permissible in zone files of the Domain Name System (DNS).

Type Type id. (decimal) Defining RFC Description Function
A 1 RFC 1035 Address record
AAAA 28 RFC 3596 IPv6 address record
AFSDB 18 RFC 1183 AFS database record
APL 42 RFC 3123 Address Prefix List
CAA 257 RFC 6844 Certification Authority Authorization
CDNSKEY 60 RFC 7344 Child DNSKEY
CDS 59 RFC 7344 Child DS
CERT 37 RFC 4398 Certificate record
CNAME 5 RFC 1035 Canonical name record
DHCID 49 RFC 4701 DHCP identifier
DLV 32769 RFC 4431 DNSSEC Lookaside Validation record
DNAME 39 RFC 6672 Alias for a name and all its subnames, unlike CNAME, which is an alias for only the exact name.
DNSKEY 48 RFC 4034 DNS Key record
DS 43 RFC 4034 Delegation signer
IPSECKEY 45 RFC 4025 IPsec Key
KEY 25 RFC 2535 and RFC 2930 Key record
KX 36 RFC 2230 Key Exchanger record
LOC 29 RFC 1876 Location record
MX 15 RFC 1035 and RFC 7505 Mail exchange record
NAPTR 35 RFC 3403 Naming Authority Pointer
NS 2 RFC 1035 Name server record
NSEC 47 RFC 4034 Next Secure record
NSEC3 50 RFC 5155 Next Secure record version 3
NSEC3PARAM 51 RFC 5155 NSEC3 parameters
PTR 12 RFC 1035 Pointer record
RRSIG 46 RFC 4034 DNSSEC signature
RP 17 RFC 1183 Responsible Person
SIG 24 RFC 2535 Signature
SOA 6 RFC 1035 and RFC 2308 Start of [a zone of] authority record
SRV 33 RFC 2782 Service locator
SSHFP 44 RFC 4255 SSH Public Key Fingerprint
TA 32768 N/A DNSSEC Trust Authorities
TKEY 249 RFC 2930 Transaction Key record
TLSA 52 RFC 6698 TLSA certificate association
TSIG 250 RFC 2845 Transaction Signature
TXT 16 RFC 1035 Text record
URI 256 RFC 7553 Uniform Resource Identifier

Refresh Token

The Refresh Token is an OAuth method to provide clients with a new access token without repeated authorization. Typically, the refresh token is issued to the client when it first acquires an access token, and has much longer lifespan than the access token.

Regular Expression

Regular expressions are coded strings that define an infinite number of possible matches.

For more information see: Java Regular Expressions

Remote ID

The Remote ID is an identifier for the client, added to all traffic from the device itself and devices communication through it.

Resolve file

The resolve file resolv.conf is a file used configure the DNS resolver.

Example contents:

search example.com local.lan
nameserver 127.0.0.1
nameserver 172.16.1.254
nameserver 172.16.2.254
nameserver 192.168.137.2

Resolver cache

Normally, all resolvers cache all replies they receive. This means that response times are greatly improved.

An iterative resolver can fetch data from the cache instead of going through the whole iteration process each time it receive a query.

For a cache all data it receives during a query. The cached data will remain cached for as long as the TTL allows.

Resolver

A DNS Resolver is part of a DNS server. It navigates the DNS tree to find any available DNS data.

Stub Resolver

A Stub Resolver is part of a DNS lookup system on devices. It stores IP addresses to iterative resolvers.

Responses are placed in the resolver cache. The data remains cached according to Time-To-Live.

Iterative Resolver

An Iterative Resolver is part of a DNS server. It navigates the DNS tree to find any available DNS data in order to determine which domain name resolves into what particular IP address.

The resolve process is done through iteration. The resolver starts from the top - the root domain, and works its way through the DNS tree until it receives an answer.

All data received during a query is placed in the resolver cache. The data remains cached according to Time-To-Live.

Resource Owner

The Resource Owner is an OAuth entity capable of granting access to a resource. When the resource owner is a person, it is referred to as an end-user. The resource owner is always a user account. Client An application making resource requests on behalf of the user (also called the resource owner) with the user's authorization.

Resource Record

Resource records are used by Domain Name Systems to identify and manage domain data.

Each record has name, number, time to live, a class, and data specific to its type.

The transmission format for resource record is specified in RFC 1035.

Resource Server

Resource Server is an OAuth term referring to the server hosting resources.

Method

A REST Method is the HTTP Verb used to access a resource.

Parameter Levels

Parameters can be defined at either the RESOURCE or at the METHOD level.

Parameters at the RESOURCE level are inherited by all contained methods, and all requests in these method nodes.

Parameters on the METHOD level are only inherited by all contained requests in that method.

Representation Types

Representations can be of three basic types: REQUEST, RESPONSE, and FAULT.

Type Decription
REQUEST An entity sent as a request.
RESPONSE An entity sent as a request.
FAULT An Received entity which equates to an error.

Representation

REST representations are the serialized text entitites - TYPE, Media-Type, Status Code, QName - used to communicate over an HTTP connection.

REST Request

REST Requests are calls to a REST service. REST Request can include HTTP Headers and parameters.

Resource

A Resource is a part of the target URL, referring to the object to be accessed with REST methods.

For the URL

http://maps.googleapis.com/maps/api/geocode/xml?address=Rio&sensor=false

the resource is

/maps/api/geocode/xml

REST

REST - Representational State Transfer is a more lightweight protocol than SOAP for HTTP communication, where parameters are mostly encoded in the request URL, but can also be sent in the message body.

RESTful

The term RESTful basically means the same as REST, but sometimes is used to mean web services that implement REST methods and architecture. They don't require a WADL to be defined. It is possible, and common, to skip this definition. This means that the service definition needs to be implied, or provided elsewhere.

Richardson Maturity Model

The Richardson Maturity Model is a scale for evaluating services and their RESTfulness. It consists of four levels:

  1. HTTP transport - Remote interaction through tunnel, no web mechanisms.
  2. Resources - Separate resources instead of a single endpoint.
  3. HTTP Verbs - Standardized use of HTTP verbs to perform actions.
  4. Hypermedia controls - HATEOAS is implemented.

For a web services to be RESTful in a meaningful sense, they need to reach level 3 of the Richardson Maturity Model.

http://martinfowler.com/articles/richardsonMaturityModel.html

http://www.ics.uci.edu/~fielding/pubs/dissertation/top.htm

http://roy.gbiv.com/untangled/2008/rest-apis-must-be-hypertext-driven

User Roles

User Roles provide different levels of access to the system. A user may have multiple roles assigned to their account.

ROM

A Read Only Memory - ROM - is a read-only memory containing firmware for the device.

Typically, the term ROM actually refers to media that can be erased and re-programmed (is an Erasable Programmable ROM - EPROM, and Electrically Erasable Programmable ROM - EEPROM.)

Root QDisc

A Root Queueing Discipline is a Quality Of Service collection point for multiple QDiscs/packet scheduler containing classes and class groups used for QoS.

Route metric

The route metric is used for routing decisions, and is added to routing tables to enable routing decisions.

Route

The IP Route is the path a data message takes through an Internet Protocol network.

Router Advertisement

Router advertisements are NDP discovery messages periodically sent by routers from each multicast interface, announcing the IP addresses of that interface.

In NDP, Router Advertisement packets have the type 134, and can be triggered by a Router Solicitation message.

Router Solicitation

Router solicitations are NDP discovery messages used by hosts to trigger Router Advertisement messages from connected routers.

In NDP, Router Advertisement packets have the type 133.

Routing Table

A routing table is a table stored in a device used for keeping track of routes to network destinations and metrics belonging to those routes. The information in the routing table is used by devices to make routing decisions for traffic in the network.

Configuration

Types of routes

Route Description Comment
Network Path to a specific network address.
Host Route to a specific network address by network and host ID. Used to optimize specific types of traffic.
Default Route stored in the routing table. Used when no other routes for the destination are found.

Routing

Routing is the process of selecting paths in a network along which to send network traffic, making routing decisions to ensure that traffic moves from the source to the destination.

Dynamic routing is the most common method, where routing protocols are used to manage routing automatically.

Static routing means that routes are set up permanently using a routing table.

Policy based routing entails selecting routes based on the type of traffic being transmitted, tryingt to use more efficient routes for priority traffic.

Request SPECification

A Request SPECification (RSPEC) is part of a Flow Specification, and defines the requirements for a flow.

Different possible service types:

Type Description Examples
Best Effort No guaranteed level of service. WWW, FTP
Controlled Load Behaves as Best Effort for an network without load.
Guaranteed Guarantees a minimum level of service, but no benefit would be provided by higher levels. Real-time control, latency and delay.
Qualitative Not imediately quantifiable, but better than Best Effort.

RSS (Memory)

RSS – Resident Set Size indicatres how much memory is allocated to a process and is in RAM.

It includes all stack and heap memory, and shared libraries also in memory, but not memory that is swapped out.

RSSI

Received signal strength indicator (RSSI) is a measurement of the power of a received radio signal.

RSVP

The Resource ReSerVation Protocol - RSVP - is a signalling mechanism used for network management of packets.

It uses a method where resources available to handle Quality Of Service traffic is broadcasted throughout the network.

Listening devices reply with a RESV (Reserve) message containing a flow specification for the traffic.

Devices on the route between sender and listener either accept the reservation and handle the flow, or send a reject message.

Reservations can end normally or time out as needed.

Response Time Analysis

A response time analysis is done to determine min, avg. and max response for a specific throughput of a transaction, a use case transaction or a complete web page.

The analysis can also be done to find the point (if any) where the response time increases due to an increase in throughput.

RTP

The Real-time Transport Protocol (RTP) is a protocol for handling transmission of real-time data, typically audio or video over networks services. Control and monitoring features are provided thorugh the Real Time Streaming Protocol.

RTSP

The Real Time Streaming Protocol (RTSP) is a protocol for control over transmission of real-time data with the Real-time Transport Protocol.

RX Chain Power Save

The RX Chain Power Save feature turns one of the receive chains off to save power.

RX Chain Power Save PPS

The maximum number of packets per second that the WLAN interface should process for during RX Chain Power Save Quiet Time before the RX Chain Power Save feature activates itself.

RX Chain Power Save Quiet Time

The number of seconds the packets per second must be below the value before the Rx Chain Power Save feature activates itself.

RXC

A RX chain is the transmit/receive signal processing hardware, such as a radio transceiver with its own antenna.

RFC1918

RFC 1918 - Address Allocation for Private Internets - defines standards for IP addresses in a private local network.

Addresses with in these ranges cannot be routed on the Internet:

10.0.0.0 - 10.255.255.255 (10/8 prefix) 172.16.0.0 - 172.31.255.255 (172.16/12 prefix) 192.168.0.0 - 192.168.255.255 (192.168/16 prefix)

More information

RFC2275

RFC 2275 - View-based Access Control Model (VACM) for the Simple Network Management Protocol (SNMP)- defines an access method for resources based on view access. It limits the access of multiple users having various security levels different views of the object tree.

More information

RFC 2473

RFC 2473 defines the model and generic mechanisms for IPv6 encapsulation of Internet packets, such as IPv6 and IPv4. The model and mechanisms can be applied to other protocol packets.

More information

RFC 4681

RFC 4681 - Neighbor Discovery for IP version 6 - specifies the Neighbor Discovery protocol for IPv6.

IPv6 nodes on the same link use Neighbor Discovery to discover each other's presence, to determine each other's link-layer addresses, to find routers, and to maintain reachability information about the paths to active neighbors.

More information

RFC 5572

RFC 5572 discusses using TSP to set up IP tunnels with inner protocols, such as IPv6 or IPv4, inside various outer protocols packets, such as IPv4, IPv6, or UDP over IPv4 for IPv4 NAT traversal.

More information

Security Associations

Security Association is term for the establishment of shared security attributes between two network entities to support secure communication. It typically consists of cryptography method, an encryption key and parameters for secure transmission of traffic.

Samba

Samba is an open source software that provides file and print services between Linux/Unix servers and Windows-based clients.

SAML 2.0

Security Assertion Markup Language 2.0 (SAML 2.0) is an XML-based, open-standard data format used for exchanging authentication and authorization data between a Service Provider and an Identity Provider.

It uses security assertion tokens to to pass information about the end user between the identity provider and the service provider.

SAML 2.0 enables web-based authentication and authorization scenarios including cross-domain single sign-on (SSO).

For more information about SAML see the Oasis documentation

Scalability

As the traffic to a service increases, design decisions made early become a more and more important factor affecting performance. You want your service to be scalable, to be able to handle a growing amount of traffic.

Having a proper REST web service implementation is one way of increasing scalability as it usually creates less traffic over network and less overhead without XML conversions needed in SOAP.

SOAP implementations can also be made scalable, but less of the architecture is explicitly designed for that purpose.

Schema Annotation

Schema Annotations are comments added to the web service definition schema used to describe the nodes.

Schema Inference

Schema inference is the process of generating an Schema from a set of messages.

When creating a REST Service without a WADL, it is often useful to be able to generate these documents anyway, so that validation is made possible, and code/documentation generation tools can be used.

Ready! API provides automatic inference from the model you create in SoapUI, and also inference of XSD schemas from any incoming responses that can be converted to XML, such as XML, JSON and HTML.

SCR

Sustained Cell Rate (SCR) is the maximum average rate at which cells can be sent over the connection. SCR can never be greater than PCR.

Script

Generally, a script is a sequence of instructions to be performed automatically.

Performance Test Script

A performance test script is a script that generates transactions. A performance test script can be simple with a single transaction or complex with a large number of transactions.

Monitoring Script

A monitoring test script is a set of instructions to perform tasks or actions on a service or web site.

Security Token

A Security Token (or Access Token) is a data object containing security credentials for a session, identifying a user, user group(s), permissions, and other security information.

Service Definition

A service definition is a machine readable description of an API interface, defining available resources, actions/operations, valid request/response pairs and other communication properties.

Service Provider

A Service Provider - SP - is provider of Web Services, such as applications, storage, or other capabilities. It uses an Identity Provider for authentication and authorization.

Service Type

Service types define the guaranteed level of service in a ATM network. This involves such things as the timing between the source and destination, the guaranteed bandwidth and how many cells get lost in transmission.

Setting Description
UBR without PCR Use Unspecified Bit Rate without Peak Cell Rate.
UBR with PCR Use Unspecified Bit Rate with Peak Cell Rate.
CBR Use Constant Bit Rate.
Non-Realtime VBR Use Non-Real-Time Variable Bit Rate.
Realtime VBR Use Real-Time Variable Bit Rate.

Severity

Severity is level indicator used for Check Status results notifications and events.

SFP

The Small Form-factor Pluggable (SFP) connector is a hot-pluggable transceiver used for telecommunication and data.

More information:

For more information see the wikipedia article.

Shaping

Traffic Shaping is a QoS process where packets are delayed, in order to keep exiting traffic under a maximum rate, or make bursts smoother.

SIP Account

A SIP Account contains the identifying information and configuration for SIP communication.

SIP Address

A SIP Address is similar to a phone number for voice calls to other SIP accounts.

SIP Authentication Name

A SIP Authentication Name is used together with an SIP Realm to provide access to SIP services. The authentication username doesn't have to be the same as the SIP user name.

SIP Codec

SIP codecs are codecs designed for use with SIP traffic.

G.711ALaw

G.711ALaw is a companding standard using non-linear encoding and decoding to provide pulse code modulation mainly of voice frequencies with the A-law variant algorithm.

G.711MuLaw

G.711MuLaw is a companding standard using non-linear encoding and decoding to provide pulse code modulation mainly of voice frequencies with the μ-law variant algorithm. It provides higher compression than A-Law, with higher distorion for smaller packets.

G.729a

G.729 is a compression standard with linear compression for voice with low bandwith requirements, suitable for voip applications where bandwith conservation is an issue. It divides 10ms packets for a 8kbit/s transmission rate.

G.726

G.726 is a compression standard using ADPCMto transmit voice at transmission rates of 16, 24, 32, and 40 kbit/s. The 32 kbit/s mode is the standard codec for DECT wireless phone systems.

SIP Domain

A SIP domain is a DNS hostname for SIP traffic routing.

SIP Realm

A SIP realm is a SIP authentication/authorization component, defining the set of usernames and passwords for a particular protection domain. The SIP realm does not have to be the same as a the SIP domain.

The SIP Realm is used together with an SIP authentication username to provide access to SIP services.

SIP Reg Interval

The SIP Reg Interval is how often connections to a SIP provider is updated. This is normally done by updating the registration with the server.

SIP Server/Registrar

A SIP server (also called SIP Registrar or SIP Proxy) handles SIP management for a IP-based private branch exchange.

It handles setup and connections for SIP calls in a network, but does not handle actual transmission of real-time data.

SIP User

A SIP User is the identifier for a SIP account. This may be a phone number.

SIP

The Session Initiation Protocol (SIP) is a protocol for handling communication sessions, most commponly for Internet telephony for voice and video calls, as well as instant messaging, over Internet Protocol networks.

SLA

The Service Level Agreement (SLA) value is used to specify if the response has been returned within a set time threshold.

SLA is expressed as a percentage, indicating the fraction of all checks that fall within the threshold.

SMS

Short Message Service - SMS - is a service using standard protocols to provide messaging text messaging, most commonly for mobile applications.

SMTP Server

A SMTP Server handles SMTP accounts and traffic to provide services for sending email.

SMTP

Simple Mail Transfer Protocol - SMTP - is an internet standard for sending email.

SNAP

The Subnetwork Access Protocol (SNAP) is an LLC extension used to distinguish additional higher layer protocols compared to LSAP.

SNAP fields allow the receiving node to pass each received frame to an appropriate device driver which understands given protocol.

Server Name Indication

Server Name Indication - SNI - is an extension of the TLS TLS protocol. It allows clients to state which hostname they are trying to connect to.

The server can then serve multiple server certificates on the same IP address and TCP port.

This lets multiple TLS services to be served off the same IP address without requiring all those sites to use the same certificate.

The conceptual HTTP equivalent is name-based virtual hosting.

SNMP Agents

An SNMP agent provides access to managament data as variables that can be modified to perform managment tasks remotely. The variables accessible via SNMP are organized in hierarchies and stored together with metadata in Management Information Bases.

Simple Network Management Protocol

Simple Network Management Protocol (SNMP) is a protocol for managing and devices on an IP network.

SNR Margin

The SNR margin is the difference between the current Signal to Noise Ratio and minimal SNR required to sync at a specific transfer speed.

Higher SNR margin means a better signal, with less background noise, which in turn means a more stable the connection.

SNR - Signal to Noise Ratio

Signal-to-noise ratio (SNR) is defined as the power ratio between a signal and background noise.

It is normally measured in decibels (dB).

dB value Description
< 6dB Poor. No sync, or intermittent sync problems.
7dB - 10dB Fair. Vulnerable to conditions.
11dB-20dB Good.
20dB-28dB Very good.
29dB < Excellent.

SOA

Start Of Authority - SOA - is a Resource Record that defines the Zone File zone file and how the master and slaves keep track of Domain Name Systems data.

SOAP Operation

SOAP Operations bind abstract operations to actual SOAP operations in the service, defining the request and response format.

SOAP Request

SOAP Requests are XML-based calls to a service which (optionally) contain SOAP parameters as part of the request body.

SOAP

SOAP - Simple Object Access Protocol, is an XML-based communication protocol and encoding format for inter-application communication.

A SOAP API is defined as a standardized communication protocol for XML-based message exchange. SOAP can use different protocols like HTTP or JMS.

All parameters the server needs to be able to respond to should be a in a W3C standardized XML format and part of the body in the request.

The current specification is version, SOAP 1.2, though version 1.1 is more widespread. SOAP is widely viewed as the backbone to a new generation of cross-platform cross-language distributed computing applications, termed Web Services.

Soft Errors

Soft errors are call failures where the cause most likely is on the scenario side, perhaps a faulty script or other issue with the calling process. A response may have been received but for example contained no data, or was of the wrong type, and so on.

Soft errors do not block the completion of the loop.

SPNEGO/Kerberos

The Simple and Protected GSSAPI Negotiation Mechanism - SPNEGO - is a GSSAPI mechanism you use to secure messages when a client application wants to authenticate to a remote server, but does not know what authentication protocol to use.

Strict Priority Precedence

Strict Priority Precedence means that where the the packets with the highest priority always are sent first.

Seamless Rate Adaptation

Seamless Rate Adaptation (SRA) allows devices to change data transfer rates on the fly to avoid losing a connection due to interference.

SRTP

The Secure Real-time Transport Protocol (SRTP) is a protocol used for providing authentication, encryption, and other se curity features with the Real-time Transport Protocol.

SRV

A Service Record (SRV record) is a specification of data in the Domain Name System containing information about IP and port for a specific service.

It is used by domain servers to keep track of their own changes without having to contact a central DNS server.

An SRV record has the form:

_Service._Proto.Name TTL Class SRV Priority Weight Port Target

Item Description
Service Identifier for the service.
Proto The service protocol.
Name Domain name where the record is valid.
TTL DNS time to live.
Class DNS class (IN for Internet).
Priority Target host priority, lower value means more preferred.
Weight A relative weight for records with the same priority.
Port Port for the service.
Target Hostname for the service provider.

SSDP

Simple Service Discovery Protocol (SSDP) is a network protocol capable of discovering universal plug and play devices on a home network.

SSH

Secure Shell (SSH) is a protocol for secure communication on networks. Most commonly it is used for remote login to devices, typically to unix shell accounts.

SSID

SSID – Service Set IDentifier, also knowns as network name, identifies a wireless network interface.

SSL Cache

When an SSL session cache is enabled, the same SSL session ID is reused for multiple requests instead of requesting new ones.

SSL Certificate

SSL CN

The Common Name - CN - identifies a hostname associated with an SSL server certificate.

The certificate is valid for a request only if the requested hostname matches the certificate common name.

For a single-name certificate, the common name is a single hostname (example.com or www.example.com).

For a wildcard certificate, the common name is a wildcard name (*.example.com).

SSL Fingerprint

An SSL fingerprint

GRC has created HTTPS Fingerprints. This service allows you to check whether or not your enterprise is performing MITM on the SSL secured site that you are trying to reach.

It compares the certificate fingerprint to what you would receive to the fingerprint that they receive by going direct. If they are the same, the certificate is authentic and you have no problem. If they are different, then it is likely that someone is performing MITM on your SSL connection.

Anyone examining an SSL certificate (like this page or your web browser) can create a “cryptographic hash” or “digest” of the certificate's contents. Cryptographic hashes are complex mathematical algorithms which carefully process every single bit of what they “digest.” They have the amazingly property that if even one bit inside the certificate is changed, an average of half of the fingerprint's hash bits will change in response! In other words, when such a cryptographic hash is used to “fingerprint” a certificate any change, no matter how small, will result in a COMPLETELY different fingerprint.

Fingerprints offer incredibly sensitive and strong detection of anything changed anywhere in a security certificate. Certificate fingerprints were originally based upon the “MD5” (Message Digest 5) hashing algorithm. But over time researchers found MD5 to be a bit weak in some special cases which might have been exploitable. So the entire industry (and this web site) has switched over to using the newer, stronger and even more secure “SHA1” (Secure Hashing Algorithm 1) hashing algorithm.

GRC has created HTTPS Fingerprints. This service allows you to check whether or not your enterprise is performing MITM on the SSL secured site that you are trying to reach. It compares the certificate fingerprint to what you would receive to the fingerprint that they receive by going direct. If they are the same, the certificate is authentic and you have no problem. If they are different, then it is likely that someone is performing MITM on your SSL connection.

SSL Renegotiation Indication Extension

The SSL Renegotiation Indication Extension - RNI - is an improvement on SSL and TLS aimed to prevent unauthorized connections where a service wrongly identifies an injected connection as belonging to a previously authorized client.

RNI achieves this by encrypting the TLS renegotiation so it is specific to the client.

SSL SAN

A Subject Alternative Name - SAN - is an additional name associated with an SSL server certificate.

The name can be a hostname, an IP address, a common name or other identifier.

Typical uses for SANs is when you want to cover multiple names across different domains/subdomains (www.example.com and www.example.net) with the same certificate, or when you have a multiple virtual hosts on the same IP address.

SSL

Secure Sockets Layer (SSL) is a protocol for providing security features such as authentication, privacy and data integrity in a network.

Source-Specific Multicast

Source-specific multicast (SSM) is a method of limiting delivery of multicast packets only from a requested source address.

Single Sign-On

Single sign-on - SSO - is the process of providing shared authentication and authorization for multiple systems. This allows a user to sign in once, and seamlessly use multiple systems with the same set of credentials.

Standard Deviation

The standard deviation, σ is a measure of how big the variation is in a set of values.

A low standard deviation indicates that the data points tend to be close to the expected value (mean), while a high standard deviation indicates that the data points are spread out.

More information: https://en.wikipedia.org/wiki/Standard_deviation

State Code

The process state code indicates the state for a process.

Short Code Meaning Description
D Uninterruptible sleep Usually refers to IO processes.
l Is multi-threaded (using CLONE_THREAD, like NPTL pthreads do)
L Has pages locked into memory (for real-time and custom IO)
N Low-priority (nice to other users)
R Running runnable (on run queue)
s Is a session leader
S Interruptible sleep Waiting for an event to complete.
T Stopped May have been stopped by control signal or trace.
W Paging Storing or retrieving data.
Z Defunct (“zombie”) process Terminated but not collected by its parent process.
< High-priority
+ Belongs to foreground process group.

Statelessness

When you design your service to be stateless, you are making it treat each new request as an independent event. No session is stored, nor information about the connecting clients. 1

This removes the need for a specific client to stay connected to a specific server, and instead of a session with multiple steps between a client and a single server you get multiple pairs of request-response traffic between a client and multiple service instances.

The main benefit of this is that as traffic grows, you can just add service instances and servers to handle the load. It doesn't matter where a specific client call ends up, since you don't need to keep track of it.

Stateless services are more common among RESTful web services than among SOAP based web services, but there is no specific technical reason for this.

Static address

A static IP address is an address that doesn't change, unless manually changed by the administrator.

Static Route

A static route is a manually entered route to a network destination, which is used instead of any routes discovered automatically.

Stealth Name Server

A stealth name server is a name server that does not have a NS record listed in the domain.

It can therefore not be queried through normal means, and must already be reachable directly to be used.

Stored Procedure

A stored procedure is a subroutine available to applications that access a relational database system. A stored procedure is stored in the database data dictionary.

Stub Resolver

A Stub Resolver is part of a DNS lookup system on devices. It stores IP addresses to iterative resolvers.

Responses are placed in the resolver cache. The data remains cached according to Time-To-Live.

STUN

Session Traversal Utilities for NAT (STUN) consists of methods and a protocol to allow a server to discover its public IP address from behind a NAT. It is used for real-time voice, video, messaging, and other interactive IP services.

The protocol requires a STUN server located on the public side of the NAT.

Subnet Mask

A subnet mask is used to divide the IP address into network and host addresses.

Subscriber ID

A Subscriber ID is a identifier assigned to messages indepenedently from client and physical network identifiers, providing an ID that persists over network and path changes.

Swagger

Swagger is a format for defining REST services.

It is a specification and a framework implementation for describing, producing, consuming, and visualizing RESTful web services. The overarching goal of Swagger is to enable client and documentation systems to update at the same pace as the server.

TCP Flags

Transmission Control Protocol (TCP) Flags are control bits for TCP messages. These flags indicate how packets should be handled or indicate connection states.

Flag Description
SYN Synchronize sequence numbers.
ACK Acknowledgment field is significant.
FIN No more data from sender.
RST Reset the connection.
URG Urgent pointer field is significant.
PSH Push function.
CWR Congestion Window Reduced.
ECE TCP peer is ECN capable.

TCP

The Transmission Control Protocol (TCP) is a protocol to provide reliable data streams over an IP network.

TD-SCDMA

Time Division Synchronous Code Division Multiple Access (TD-SCDMA) is an UMTS 3G mobile networks in China.

Think time

The think time is the time between one user interaction to the next user interaction that in turn create a new call to the server side.

If the application does not have a user interface it is the time between to calls or between two transactions.

Threshold

A severity of a particular type is trigged whenever the returned value from the check is higher than the configured threshold, the baseline.

The notification threshold / baseline can be defined in several ways.

Settings

Setting Description
Method  Constant / Average / Median / Deviation
Percentage  Percentage threshold based on the calculated value.
Deviation  Number of standard deviations
Period  Time period for historical results to include in the calculation. 
Offset  Constant to add to the calculated value. 

Calculations

Static calculations uses a constant threshold value.

Dynamic methods calculate the threshold value on the fly, based on a combination of the type (percentage or deviation), the method (average, median, deviation), the period (time frame for historical data to use), and offset which is added to the calculated value.

Method Calculation Type Example
Constant   A fixed value. Static  25
Average Average. Dynamic 120% of the average returned value for the last 2 hours + offset 50.
Median Median. Dynamic 120% of the median value for the last 2 hours + offset 50.
Deviation  Standard deviation. Dynamic 2 standard deviations + average value for the last 2 hours + offset 50.

Throughput

The throughput is the traffic volume (typically measured in Mbit/s) over the network.

Throughput can also be considered as the number of transactions per second an application can handle.

TKIP

TKIP (Temporal Key Integrity Protocol) is a RC4 stream cipher is used with a 128-bit per-packet key, meaning that it dynamically generates a new key for each packet.

TLS

Transport Layer Security (TLS) is a protocol for providing security features such as authentication, privacy and data integrity in a network.

Token Bucket

A token bucket algorithm is a method of handling packet traffic, by using an analogy of a bucket containing a number of tokens that arrive at a particular rate. Tokens are used to limit when data packets are transmitted.

The depth of the bucket limits the number of tokens, and the rate of arriving tokens limits how quickly packets can be sent.

The concept is as follows:

  • Tokens are added to the bucket at a fixed rate.
  • If the bucket becomes full, arriving tokens are thrown away.
  • Arriving data packets use up tokens from the bucket and are transmitted on the network.

This means that the bucket needs to be deep enough to handle bursts of traffic, and the token rate limits the transmission rate.

TPC

Transmission Power Control (TPC) is used to automatically adjust the transmission power level on wireless radios to avoid interference.

TPtest

TPTEST allows you to measure the speed of your Internet connection, by sending a number to and from a defined reference test server.

More information:

A list of TP test servers is available at http://tptest.sourceforge.net/servers.php.

TR069

TR-069 CPE WAN Management Protocol (CWMP) was created by the DSL Forum to standardize the Wide Area Network (WAN) management of CWMP. The TR-069 protocol specifically defines a common method for CPE devices to communicate with an Auto Configuration Server (ACS).

Traceroute

Traceroute is a network diagnostic tool to discover the route and data delivery time over an Internet Protocol network.

See also Ping.

Transaction Rate

The Transaction Rate is the number of successfully completed URL calls / transactions made per second.

Transaction

A performance transaction is a single call/response using a specific protocol such as HTTP/S.

Triple Play

The term Triple Play Service refers to provisioning of broadband Internet access, television, and telephone over a single broadband connection.

Transaction Response Time

The Transaction Response Time is the time it takes for a single transaction, including receiving the response.

It is the amount of time from the moment that a user sends a request until the time that the application indicates that the request has completed.

TrustStore

Truststores contain certificates that identify parties that you choose to trust.

Truststores often do not include the certificate from the remote party directly, but instead holds certificates from organizations that are trusted to identify the certificate of the remote party.

Such organizations are commonly referred to as “Certificate Authorities”.

TrustStore stores public keys and/or CA (Certificate Authorities) certificates.

The SSL Java client uses SSL certificates, commonly .cer files, stored in TrustStore to verify the server identity.

See also: KeyStore.

See also: Identity.

TSP

Tunnel Setup Protocol - TSP - is a a networking control protocol used to negotiate IP tunnel setup parameters between a tunnel client host and a tunnel broker server, the tunnel end-points.

The protocol is defined in RFC 5572.

Traffic SPECification

A Traffic SPECification (TSPEC) is part of a Flow Specification, and describes traffic flow properties, typically involving token bucket algorithm parameters.

Time To First Byte

The Time To First Byte - TTFB - value is a measure of how long the wait is for the first byte of the response, after the request has been successfully transmitted.

TTL

Time to live (TTL) is a mechanism to determine when data in a network should be discarded, for example for cache expiry, or to prevent data from being transmitted forever.

Time To Transit

The Time To Transmit value indicates the time it takes to send the HTTP request header, after a network connection has been established.

This value may also include the transmission time for any HTTP request content data (form data or file upload data).

Tunnel

An IP tunnel is an IP network channel between two networks. It is used to transfer data using a different protocol by wrapping its packets in packets of a different type.

In IP tunnelling, every IP packet, including addressing information of its source and destination IP networks, is encapsulated within another packet format native to the transit network.

UAPSD

Unscheduled Automatic Power Save Delivery (UAPSD) is a wifi device feature which allows them to save power by dozing between transmissions.

UBIFS

UBIFS file-system stands for “Unsorted Block Images File System”.

It is a flash file system, designed to work with flash devices, using Memory Technology Device (MTD) device files.

UBR

Unspecified Bit Rate (UBR) is used for non-real-time applications that do not require any maximum bound on the transfer delay or cell loss.

UBUS

OpenWrt micro bus architecture - UBUS - is a combination of daemon, library and helpers to provide communication between various daemons and applications in OpenWrt.

The ubus command line tool can be used to interact with the ubusd server to and manage services through JSON .

Command referencs is available at https://wiki.openwrt.org/doc/techref/ubus.

UDP

User Datagram Protocol (UDP) is a protocol to provide relatively unreliable data streams over an IP network. It provides no guarantees for delivery and no protection from duplication.

The simplicity of UDP reduces the overhead from using the protocol and the services may be adequate in many cases.

UMTS

Universal Mobile Telecommunications System (UMTS) is a third generation mobile cellular system for networks based on the GSM standard.

Unicast

Unicast is communication where information is addressed to a single destination.

Unmanaged

The interface protocol type Unmanaged means that the connection has no defined protocol.

UPnP

Universal Plug and Play (UPnP) is a set of networking protocols used for automatic discovery and communication on a network. It makes it possible for various devices to connect and share services.

UPnP involves automatic port forwarding set up without user interaction. This may constitute a security risk.

URL Encoding

URL Encoding (also known as percent encoding) is the process of converting a URL so as to replace reserved characters that have a special meaning with special escape character sequences.

For example / might be replaced with %2F and ( with %28.

This is done to differentiate between when the characters used as text and when they are used in their special meaning.

URL Filter

An URL filter excludes certain URL types from execution.

URLs can be filtered out based on a number of criteria, which can be used together or separately as needed:

Filer Description Comment
 Binary Data Non-ASCII content data with a 200 (ok) status code. This will strip away all images and other kinds of binary data.
 CSS, JS (HTML Only) Text/ASCII data not in HTML format with a 200 (ok) status code. This will strip away CSS and JavaScript files.
 Cached Data (304) Browser-side cached URLs received with a 304 (found) status code. Recommended.
 Errors All errors status code 400 and above, and all URLs with an incomplete response. If not enabled, a reported error will count as a successful connection.
 Host Hostname exclusion/inclusion filtering.

Hostname Exclusion/Inclusion

Host filtering can be used to exclude and/or include traffic from particular hostnames.

The filter can consist of a list of hostnames, separated by comma.

You can also explicitly exclude hosts by adding ! before the hostname.

Examples

www.example.com,media.example.com

All traffic not from www.example.com or media.example.com will be excluded.

!media.example.com

Traffic from media.example.com will be excluded.

URL

A Uniform Resource Locator - URL - is a web resource location reference which points out where to find a particular resource (file, script, image et. c.).

A typical URL is of the form http://www.example.com/about/us/index.html:

protocol hostname path file name
http www.example.com about/us/ index.html

USB

USB – Universal Serial Bus is a standard for connection, communication, and power supply between computers and electronic devices.

Use Case Iteration Time

The Use Case Iteration Time is the time it takes to perform one iteration of all the steps in a use case including optional loops and think time.

Use Case

A use case can be functional or non-functional and describes in detail each step and interaction with an application.

If the application has a user interface the use case usually describes the most common interaction that a real user would do.

A functional use case can often be adopted to a non-functional use case by removing unnecessary steps that is not direct related to performance.

User-Agent

The User-Agent contains information about client and operating system accessing the server or application, typically offered in the HTTP request headers. This allows the server to select suitable content and parameters for the response.

User Class

The User Class uniquely identifies the type or category of user or applications it represents.

UTF

Unicode Transformation Format - UTF - is a character encoding that maps Unicode code points (characters) to code values.

UTF encoding is available in multiple versions. The two most common types are UTF-8 and UTF-16.

UTF-8 is a variable-length encoding using up to 8-bit code units. It is backward compatible with ASCII.

UTF-16 is also variable-length using one or two 16-bit code units.

UUID

A Universally Unique Identifier (UUID) is an 128-bit identifier used to uniquely identify objects.

Example: 65613210-44d4-11e6-beb8-9e71128cae77

VBR

The service type Variable Bit Rate come in two variants: Non-Realtime VBR and Realtime VBR.

Non-Realtime VBR

Non-Real-Time Variable Bit Rate (nrt-VBR) is used for connections that need guaranteed bandwidth or latency, but do not rely on accurate timing between source and destination.

Realtime VBR

Real-Time Variable Bit Rate (rt-VBR) is used for connections that need accurate timing between source and destination.

VC-MUX

Virtual Circuit Multiplexing (VC-MUX) is a method for identifying the protocol carried in frames used in ATM.

Using virtual circuit multiplexing, hosts agree on the high-level protocol for a given circuit. Each high-level protocol requires a separate virtual circuit.

VCI

Virtual Channel Identifier - VCI, is used together with VPIs to enable ATM networks.

In an ATM network, each circuit is given a virtual channel identifier, and and each path is given a virtual path identifier.

The VCI identifies circuit/channel in use, and VPI matches the appropriate path to the desired destination host.

VDSL

Very-high-bit-rate digital subscriber line (VDSL) is a DSL technology providing network traffic over copper wires.

VDSL is faster than ADSL, with up to 52 Mbit/s downstream and 16 Mbit/s upstream speeds.

Vendor ID

A Vendor ID - VID - is a unique number identifying a device.

Virtual Network Interface

Virtual network interfaces are linked to a hardware device, but are not hardware devices.

A virtual network interface is generally associated with a physical network, another virtual interface, a loopback interface or other standalone interfaces.

Types of Virtual Network Interfaces

Type Example Description
Aliases eth4:5, eth4:6 Used to handle multiple IP-addresses per interface. Supported for backwards compatibility.
Bridges br0, br-lan Used to make multiple network interfaces behave as one network interface.
Stacked VLANs 10, 20 IEEE 802.1ad type network, using two or more tags in each packet.
Special purpose imq0, teql3 Used to change the order of outgoing or incoming network packets.
Tunnel interfaces pppoe-dsl, tun0, vpn1 Used to send packets over a tunneling protocol.
VLANs eth4.0, vlan0 Used to separate a network into multiple virtual networks.
Wireless operating mode virtual interfaces wlan0, ath3 A wireless subsystem created automatically for a wireless NIC master interface.

VLAN Tag

The VLAN Tag (VLAN ID) is a method to identify the which VLAN a packet belongs to.

Devices use the VLAN ID to determine which port(s), or interface(s), to send a multicast packet to.

VLAN

A virtual LAN (VLAN) is, as the name implies, a virtualized LAN. Most commonly a VLAN is a subdivision of a network.

VLANs also allow grouping of hosts together even if the hosts are not connected to the same network device, and managing them through software.

VOIP

VoIP - Voice Over IP is a group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol networks.

VPI

A Virtual Path Identifier - VPI, is used together with VCIs to enable ATM networks.

In an ATM network, each circuit is given a virtual channel identifier, and and each path is given a virtual path identifier.

The VCI identifies circuit/channel in use, and VPI matches the appropriate path to the desired destination host.

VPN

A virtual private network (VPN) is a secured, private network connected through a public network.

%VSZ

VSZ is the Virtual Memory Size. It includes all memory that the process can access, including memory that is swapped out and memory that is from shared libraries.

VSZ

VSZ is the Virtual Memory Size. It includes all memory that the process can access, including memory that is swapped out and memory that is from shared libraries.

WADL

WADL stands for Web Application Description Language and is the REST equivalent to WSDL. An important difference is that the WADL is not required.

Example

A REST based web service (REST Service) may be defined by a WADL descriptor file. It may look like this:

<application XMLns="http://wadl.dev.java.net/2009/02">
     <resources base="http://example.com/api">
         <resource path="books">
             <method name="GET"/>
             <resource path="{bookId}">
             <param required="true" style="template" name="bookId"/>
             <method name="GET"/>
         </resource>
         </resource>
     </resources>
</application>

A WADL definition is similar to WSDL in the way that it defines what you can do. It defines the supported HTTP verbs. In this example we can see that we are able to get information about books using the HTTP method GET.

We can also notice that there is a required resource that must be part of the request.

More information

More information is available in the W3C standard suggestion

WAN

A Wide Area Network (WAN) is network that extends over a large geographical distance.

Waterfall Diagram

A browser waterfall diagram shows the series of actions performed by the client and server when a specific URL is accessed.

The information is shown as a cascading list of items showing how the browser loads and renders the URL. Every row in the diagram represents a single request made by the client. The timing of the events relating to the request is indicated by the length of the bars on the row.

WCDMA

Wideband Code Division Multiple Access (W-CDMA) is a mobile communications technology using CDMA for broadband.

Web Service

A web service is a service available on a network and will allow other systems to communicate with it, using a defined protocol. The web part indicates that the service is using transport protocols designed for the World Wide Web, i.e. it uses HTTP to communicate. Other systems can be web applications, apps in phones and similar.

There are two major flavors of web services: Simple Object Access Protocol SOAP and Representational State Transfer REST.

WebSocket

WebSocket is a communication protocol for full-duplex communication channels over a single TCP connection.

WebSocket connections allow for real-time data transfer where the the server sends content to the browser continuously without additional client requests.

Messages can be sent to be passed back and forth while keeping the connection open, allowing for two-way communication between the client and the server.

Webbsockets use TCP to communicate over ports 80 for HTTP and 443 for TLS.

More Information

WEP

Wired Equivalent Privacy (WEP) is a security algorithm intended to provide security comparable a wired network.

WEP uses a key of 10 or 26 hexadecimal digits.

Weighted Fair Queuing

Weighted Fair Queuing means that bandwidth is adjusted automatically according to traffic priority and weight value.

WiFi band

A wifi band is a collection of wifi channels provided by a particular wifi radio.

Bands are identified by their frequency as measured in Gigahertz (GHz).

Standard bands are 2.4GHz and 5Ghz.

WiFi channel

A wifi channel is a frequency range in a specific wifi band used for wifi communication.

WiFi encryption

WiFi encryption means to encrypt the messages that are sent between nodes on a wireless network.

A wifi interface can use one of several encryption options:

None No encryption.
WEP Wired Equivalent Privacy
WPA2 Personal (PSK) Wi-Fi Protected Access
WPA/WPA2 Personal (PSK) Mixed Mode Wi-Fi Protected Access II Pre-Shared Key
WPA2 Enterprise Wi-Fi Protected Access II Enterprise
WPA/WPA2 Enterprise Mixed Mode Wi-Fi Protected Access Enterprise / Wi-Fi Protected Access II Enterprise

WiFi interface

A wireless interface is the access point to a wireless radio. Interfaces are identified by their SSID.

Each radio can have several SSIDs and each SSID interface can be configured as part of a network bridge or firewall group.

WiFi Key

The WiFI Key or passphrase is a shared secret between client and server used for encryption and decryption in wireless networks.

WiFi Mode

The WiFi Mode defines which to use for wireless communication in the network.

Auto

The Auto Mode allows the device to automatically select a suitable profile among the available options.

802.11a

802.11a is a wireless radio specification for the 5 GHz band with a maximum data rate of 54 Mbit/s.

802.11ac

802.11ac is a wireless radio specification for both the 2.4 GHz and the 5 GHz bands with support for multiple-input multiple-output antennas, providing a maximum data rate from 433 Mbit/s to 1300 Mbit/s.

802.11b

802.11b is a wireless radio specification for the 2.4GHz band with a maximum data rate of 11 Mbit/s .

802.11b/g

802.11b/g is a wireless radio specification combining 802.11b and 802.11g standards in dual band mode.

802.11g

802.11g is a wireless radio specification for the 2.4 GHz band with a maximum data rate of 54 Mbit/s.

802.11n

802.11n is a wireless radio specification for both the 2.4 GHz and the 5 GHz bands with support for multiple-input multiple-output antennas, providing a maximum data rate from 54 Mbit/s to 600 Mbit/s.

WiFi

WiFi or Wi-Fi is a technology allowing devices to connect to a wireless LAN (WLAN) network. The term “Wi-Fi” is a play on words relating to hi-fi (high fidelity) from the music industry. Communication is commonly done over 2.4 gigahertz and 5 gigahertz radio bands.

Wireless radio

A wireless radio is the device sending out a wireless signal. Each radio can have several interfaces associated with it.

LAN

A Wireless Local Area Network is Local Area Network connected through one or several access points.

WMM Acknowledgement

WMM (WiFi Multimedia) Acknowledgement is a verification signal sent from the client to the device to indicate that no error has been detected for the data .

WMM Power Save

WMM Power Save allows small devices, such as phones and PDAs, to transmit data while in a low-power status.

WMM / WME

WiFi Multimedia - WMM (also known as WiFi Multimedia Extension - WME) - improves quality of service on a network by prioritizing data by four configurable categories:

Voice: Voice packets for Voice over IP (VoIP) calls.

Video: Video packets for support of TV streams.

Best effort: Support for legacy devices or devices lacking QoS standards.

Background: File downloads, print jobs and other traffic that does not suffer from increased latency.

WMM does not provide guaranteed throughput.

WPA Enterprise

Also referred to as WPA-802.1X mode, and sometimes just WPA (as opposed to WPA-PSK), is designed for enterprise networks and requires an authentication server.

It provides additional security (e.g. protection against dictionary attacks on short passwords).

Various kinds of the Extensible Authentication Protocol (EAP) are used for authentication.

WPA personal

Wi-Fi Protected Access (WPA), also referred to as WPA-PSK (pre-shared key) does not require an authentication server.

It uses TKIP, with a key either as a string of 64 hexadecimal digits, or as a passphrase of 8 to 63 characters.

WPA also includes a message integrity check, which is designed to prevent an attacker from altering and resending data packets.

WPA-Personal mode is available with both WPA and WPA2.

WPA2 Enterprise

Wi-Fi Protected Access 2 Enterprise is designed for enterprise networks and requires an authentication server.

It provides additional security (e.g. protection against dictionary attacks on short passwords).

Various kinds of the Extensible Authentication Protocol (EAP) are used for authentication.

WPA2 PSK

Short for Wi-Fi Protected Access 2 – Pre-Shared Key, and also called WPA2 Personal, it is a method of securing your network using Pre-Shared Key (PSK) authentication,

Wi-Fi Protected Access 2 Personal uses pre-shared passphrases between 8 and 63 characters long.

The wireless device converts the preshared key to a hash and uses that for communication authentication.

WPS

Wi-Fi Protected Setup (WPS) is an authentication key distribution method. It can be performed in one of several ways.

PIN code: A PIN is entered on the client.

Push button: An actual or virtual button is pressed on the device and the client within a short amount of time.

Near field: The client is brought physically close to the device.

USB: An USB device is used to transfer data between the new client and the device. (Deprecated)

WSDL

WSDL stands for Web Service Definition Language and is a W3C web service description language standard for describing SOAP web services, using XML.

It describes network services as a set of endpoints operating on messages containing either document-oriented or procedure-oriented information. The operations and messages are described abstractly, and then bound to a concrete network protocol and message format to define an endpoint.

Related concrete endpoints are combined into abstract endpoints (services). WSDL is extensible to allow description of endpoints and their messages regardless of what message formats or network protocols are used to communicate, however, the only bindings described in this document describe how to use WSDL in conjunction with SOAP 1.1, HTTP GET/POST, and MIME.

WS-Security

Web Services Security - WS-Security / WSS - is a SOAP extension protocol for adding security to web services by adding security tokens, for example SAML), Kerberos, and X.509.

For more information see oasis documentation

WWAN

A Wireless Wide Area Network (WWAN), is a wireless network that extends over a large geographical distance.

X.509

X.509 is a standard that defines the format of public key certificates. They are used in many Internet protocols, including TLS/SSL.

XFF

X-Forwarded-For - XFF - is an HTTP header used to for identifying the originating IP address of a client.

XML

Extensible Markup Language - XML - is a markup language standard for documents that aims to be readable for both humans and machines, while separating the markup form the content.

Syntax

XML content consists of “start”, “end” and “empty” Tags (E.g.: <section> / <section> / <line-break />), which make up elements containing data (E.g.: <greeting>Hello, world!</greeting> / <line-break />).

Elements can contain other elements (child elements) and form a tree: (E.g.: <name><first>Firstname</first><last>Lastname</last></name> / <line-break />).

Start and empty tags can contain any number of unique Attributes consisting of name-value pairs (E.g.: <img src="logo.png" alt="Logo" />).

Optionally, XML files can start with an XML declaration (E.g.: <?xml version="1.0" encoding="UTF-8"?>) identifying aspects of the XML content.

Example:

snippet.xml
<?xml version="1.0" encoding="UTF-8"?>
<Config>
  <Version>V5.5-F</Version>
  <configurationEnabled>false</configurationEnabled>
  <pmaHost></pmaHost>
  <pmaPort>26401</pmaPort>
  <pmaNetworkProtocol>2</pmaNetworkProtocol>
  <pmaRequestTimeoutSeconds>60</pmaRequestTimeoutSeconds>
  <useHttpProxy>false</useHttpProxy>
  <httpProxyHost></httpProxyHost>
  <httpProxyPort>0</httpProxyPort>
  <httpProxyAuthUsername></httpProxyAuthUsername>
  <httpProxyAuthPassword></httpProxyAuthPassword>
</Config>

XML-RPC

XML-RPC is a remote procedure call (RPC) protocol which uses XML to encode its calls via HTTP.

XML-RPC uses method calls to the service and passes parameters to the remote method to achieve results.

Parameter styles can be nested or use maps and lists, allowing for objects and structures both as input and output.

Most HTTP security methods can be used for authorization.

XMPP

Extensible Messaging and Presence Protocol - XMPP - (originally called Jabber) is an XML-based technoology technology for real-time communication.

XPath

XML Path Language - XPath - is a query language for selecting nodes from an XML document.

Example

For some XML like this:

<root>
  <node>
    <target />
  </node>
</root>

the XPath to target would be

/root/node/target

XSD

Originally defined as XML Schema, is a description of a type of XML document, typically expressed in terms of constraints on the structure and content of documents of that type, above and beyond the basic syntactical constraints imposed by XML itself. An XML schema provides a view of the document type at a relatively high level of abstraction.

Resource Owner

The Resource Owner is an OAuth entity capable of granting access to a resource. When the resource owner is a person, it is referred to as an end-user. The resource owner is always a user account. Client An application making resource requests on behalf of the user (also called the resource owner) with the user's authorization.

Resource Server

Resource Server is an OAuth term referring to the server hosting resources.

Authorization Server

The Authorization Server is an OAuth term referring to the server handling authentication and authorization an providing the client with access tokens for access to resources.

Authorization Request

An Authorization Request is an OAuth request from a client to access a resource. It consists of an HTTP POST message identifying the client and providing credentials for authorization.

Authorization Grant

The Authorization Grant is an OAuth credential representing the resource owner's authorization to access a resource. It consists of either user login credentials or a refresh token.

Access Token

An Access Token is a secure string used in OAuth to provide a client with access to resources. The access token is issued to to clients that have a valid authorization grant.

Refresh Token

The Refresh Token is an OAuth method to provide clients with a new access token without repeated authorization. Typically, the refresh token is issued to the client when it first acquires an access token, and has much longer lifespan than the access token.

Zone File

A zone file is a text file that describes a DNS zone - a subset of the hierarchical domain name structure of the DNS.

The zone file contains Resource Records describing domain names, IP addresses and other resources.

Zone Transfer

Zone transfer is a type of DNS transaction that involves copying DNS database information between DNS Servers.

2G

Second-generation wireless telephone technology (2G), is a cellular network for digital mobile data communication.

3G

Third-generation wireless telephone technology (3G), is a cellular network for digital mobile data communication for broadband traffic.

4G

Fourth-generation wireless telephone technology (4G), is a cellular network for digital mobile data communication for high-speed broadband.

4in6

4in6 is a method to transmit IPv4 traffic over explicit IPv6 connections.

It is achieved by using tunneling to encapsulate IPv4 traffic over configured IPv6 tunnels as defined in RFC 2473.

These tunnels are usually manually configured but they can be automated using protocols such as TSP.

6in4

6in4 is a method to transmit IPv6 traffic over explicit IPv4 connections.

The traffic is sent over the IPv4 Internet inside IPv4 packets whose IP headers have the IP protocol number set to 41.

6rd

6rd is a method for IPv6 rapid deployment on Internet Service Provider IPv4 infrastructures, operating within the ISP's network.

6to4

6to4 is a method to transmit IPv6 traffic over IPv4 networks without having to configure explicit tunnels.

802.11a

802.11a is a wireless radio specification for the 5 GHz band with a maximum data rate of 54 Mbit/s.

802.11ac

802.11ac is a wireless radio specification for both the 2.4 GHz and the 5 GHz bands with support for multiple-input multiple-output antennas, providing a maximum data rate from 433 Mbit/s to 1300 Mbit/s.

802.11b

802.11b is a wireless radio specification for the 2.4GHz band with a maximum data rate of 11 Mbit/s .

802.11b/g

802.11b/g is a wireless radio specification combining 802.11b and 802.11g standards in dual band mode.

802.11g

802.11g is a wireless radio specification for the 2.4 GHz band with a maximum data rate of 54 Mbit/s.

802.11n

802.11n is a wireless radio specification for both the 2.4 GHz and the 5 GHz bands with support for multiple-input multiple-output antennas, providing a maximum data rate from 54 Mbit/s to 600 Mbit/s.

802.1p

802.1p is a standard for priority levels, identifying the class of service a VLAN is to be used for. There are 8 different levels, numbered from 0 to 7.

Priority Acronym Traffic types Comment
0 BK Background Lowest
1 BE Best Effort
2 EE Excellent Effort
3 CA Critical Applications
4 VI Video < 100 ms latency and jitter
5 VO Voice < 10 ms latency and jitter
6 IC Internetwork Control
7 NC Network Control Highest

802.1q

IEEE 802.1Q is a standard for Ethernet VLANs where VLANs are given a numeric tag. The tag is used to identify traffic in networks, and decide how to handle it.

This allows multiple bridged networks to share the same physical link without leaking information to each other networks.