Windows95.com Internet Hyper-Glossary StartConnectivity32-bit SharewareQuickTutors 95SearchE-mail Click here for Microsoft SQL Server This is a large document. Please be patient while it loads. To help those of you who are wondering what all those acronyms and funny-sounding words used by "computer types" really mean when they talk about the Internet, I've put together this simple glossary of common Internet terms. Some of the terms here may help you if you've been following the instructions at Windows95.com. As the Internet develops (and as more funny-sounding words are used), I will add to this glossary. If you have any suggestions for new glossary items, or would just like to tell me how you liked my pages, please email me! The glossary items are listed in alphabetical order, with hyperlinks embedded in the definitions. That way, if there is an Internet term in a definition that you don't understand, you can probably link directly to another definition that explains it. I plan to add search capabilities to this page soon. A PDF (portable document file) version of this file is available. Click here to download it now. Using Adobe's free Acrobat Reader software, you can view this document offline. _________________________________________________________________ Acceptable Use Policy (AUP) This refers to policies that restrict the way in which a network may be used. Usually, a network administrator makes and enforces decisions dealing with acceptable use. _________________________________________________________________ Address See either IP Address or Email Address. _________________________________________________________________ Address Mask The address mask is used to identify the parts of an IP address that correspond to the different sections (separated by dots). It's also known as the "subnet mask" since the network portion of an address can be determined by the encoding inherent in an IP address. _________________________________________________________________ Advanced Research Projects Agency Network (ARPANET) A pioneering long-haul network funded by what's now-called DARPA (formerly known as ARPA). It was the foundation on which the Internet was built. _________________________________________________________________ Agent The part of a system that performs information preparation and exchange on behalf of an application. _________________________________________________________________ Alias A type of nickname (usually short and easy to remember) that refers to a type of network resource. Aliases are used so you won't have to remember the long and difficult names typical of network resources. _________________________________________________________________ Anonymous FTP By using the word "anonymous" as your user ID and your email address as the password when you login to an FTP site, you can bypass local security checks and gain limited access to public files on the remote computer. This type of access is available on most FTP sites, but not all. _________________________________________________________________ Application Sometimes known as a client or an "app," it's a program that performs a specific function. FTP, Mail, Gopher, Mosaic, and Telnet clients are the most common examples of Internet applications. _________________________________________________________________ Archie You'll usually hear this term referred to in the phrase "archie search." Archie is a way of automatically gathering, indexing and sometimes even retrieving files on the Internet. Most good archie clients are able to FTP files once you've found the information you're looking for. _________________________________________________________________ Archive A collection of files stored on an Internet machine. FTP sites are known as archives. _________________________________________________________________ ARPANET See Advanced Research Projects Agency Network. _________________________________________________________________ Asynchronous Transfer Mode (ATM) A transfer method that dynamically allocates bandwidth using a fixed-size "packet," or "cell." Also known as "fast packet." _________________________________________________________________ ATM See Asynchronous Transfer Mode. _________________________________________________________________ AUP See Acceptable Use Policy. _________________________________________________________________ Authentication Any process that ensures that users are who they say they are. When you type your name and password, you are authenticated and allowed access. _________________________________________________________________ Bandwidth This refers to the difference (measured in Hz), between the highest and lowest frequencies of a transmission. Most people loosely refer to bandwidth as the amount of data that can be transferred over a network connection. _________________________________________________________________ BBS See Bulletin Board System. _________________________________________________________________ Berkeley lnternet Name Domain (BIND) An early version of a DNS server developed by the University of California at Berkeley. Most Internet hosts run a version of BIND. _________________________________________________________________ Bitnet An computer network devoted to academic use that provides email and file transfer services using a store-and-forward protocol. It is based on the IBM Network Job Entry protocols. A more recent version of Bitnet (known as Bitnet-II) encapsulates the Bitnet protocol within IP packets. _________________________________________________________________ Bounce If you send email and it fails to arrive at its intended recipient for any reason (incorrect user name, network failure, etc.), the message "bounces" and returns to you. The subject line in a bounced message usually says something like: "Undeliverable Mail" or "Message Undeliverable." _________________________________________________________________ BTW Acronym meaning "By The Way." Seen mostly in IRC sessions. _________________________________________________________________ Bulletin Board System (BBS) A computer which typically provides email services, file archives, and announcements of interest to the bulletin board system's operator (known as a sysop). BBS's started out as hobbies for computer enthusiasts, and were mostly accessible by modem. Recently, however, more and more BBS's are being connected to the Internet. _________________________________________________________________ CCIRN See Coordinating Committee for Intercontinental Research Networks. _________________________________________________________________ CCITR See Comite Consultatif International de Telegraphique et Telephonique. _________________________________________________________________ CERT See Computer Emergency Response Team. _________________________________________________________________ Challenge-Handshake Authentication Protocol (CHAP) An authentication method that can be used when connecting to an Internet Service Provider. CHAP allows you to login to your provider automatically, without the need for a terminal screen. It is more secure than the Password Authentication Protocol (another widely used authentication method) since it does not send passwords in text format. _________________________________________________________________ CHAP See Challenge-Handshake Authentication Protocol. _________________________________________________________________ Chat Another term for IRC . Also, an acronym meaning "Conversational Hypertext Access Technology." _________________________________________________________________ CIX An acronym meaning "Commercial Internet Exchange." _________________________________________________________________ Client In Internet terms, it's an application that performs a specific function, such as Telnet or FTP. It's the "front-end" to an Internet process. In more general terms, a client is computer system or process that requests a service of another computer system or process. The much talked about "client-server architecture" refers to a workstation requesting the contents of a file from a server. _________________________________________________________________ Comite Consultatif International de Telegraphique et Telephonique (CCITT) French for "International Telephone and Telegraph Advisory Council." It's an organization that plays a major role in the United National International Telecommunications Union (ITU). The CCITT is responsible for making technical recommendations about communications systems worldwide. Every four years, CCITT updates the standards, most recently in 1992. _________________________________________________________________ Computer Emergency Response Team (CERT) The CERT was formed by DARPA in November 1988 in response to the Internet worm incident. CERT exists to facilitate Internet-wide response to computer security events involving Internet hosts and to conduct research targeted at improving the security of existing systems. They maintain an archive of security-related issues on their FTP server at "cert.org." Their email address is "cert@cert.org" and their 24-hour telephone Hotline for reporting Internet security issues is (412) 268-7090. _________________________________________________________________ Coordinating Committee for Intercontinental Research Networks (CCIRN) A committee that provides a forum for North American and European network research organizations to cooperate and plan. _________________________________________________________________ Corporation for Research and Educational Networking (CREN) An organization formed in October 1989, when Bitnet and CSNET were combined. CSNET is no longer around, but CREN still operates Bitnet. _________________________________________________________________ Cracker Substantially different from "hackers," crackers are users who try to gain illegal access to computers. They are usually malicious in their intentions. _________________________________________________________________ Cyberspace The "world of computers and the society that gathers around them," as referred to by William Gibson in his fantasy novel "Neuromancer." It now loosely refers to the online world and even more loosely to the Internet. _________________________________________________________________ Data Encryption Key (DEK) Much like an actual key used for locking and re-opening doors, DEKs are used for the encryption and decoding of message text, sometimes in the form of a digital signature. _________________________________________________________________ Data Encryption Standard (DES) A standardized encryption method widely used on the Internet. _________________________________________________________________ Datagram A block of data that is "smart" enough (actually, which carries enough information) to travel from one Internet site to another without having to rely on earlier exchanges between the source and destination computers (not to be confused with a Candygram). _________________________________________________________________ DDN See Defense Data Network. _________________________________________________________________ DECnet The proprietary network protocol designed by Digital Equipment Corporation. _________________________________________________________________ Dedicated Line A communications line that is used solely for computer connections. If you buy an additional phone line for your modem, that's a dedicated line. There are other types of dedicated lines (such as T3s and T1s) that are used for larger network entities. _________________________________________________________________ Defense Data Network (DDN) A global communications network that serves the US Department of Defense. It is made up of a network called MILNET, other portions of the Internet, and classified networks which are not part of the Internet. The DDN is used to connect military installations and is managed by the Defense Information Systems Agency. It was originally developed by DARPA. _________________________________________________________________ Dialup A widely-used method of accessing the Internet. A dialup connection uses regular phone lines to connect one computer to another via modem. _________________________________________________________________ Distributed Computing Environment (DCE) An architecture based on standard programming interfaces, conventions, and server functionalities used for distributing applications transparently across networks. The DCE is controlled and promoted by the Open Software Foundation (OSF), a consortium of vendors including DEC, IBM and Hewlett Packard. _________________________________________________________________ DNS See Domain Name Service. _________________________________________________________________ Domain A "logical" region of the Internet. People sometimes refer to them loosely as "sites." Generally, a domain corresponds to an IP address or an area on a host. _________________________________________________________________ Domain Name System (DNS) The DNS is a static, hierarchical name service used with TCP/IP hosts, and is housed on a number of servers on the Internet. Basically, it maintains a database for figuring out and finding (or resolving) host names and IP addresses on the Internet. This allows users to specify remote computers by host names rather than numerical IP addresses (if you've used UNIX, you may have heard the DNS referred to as the BSD UNIX BIND service). For example, go to a DOS prompt in Windows 95, the % prompt in UNIX, or use a ping client for Windows 3.1 or Mac, and type "PING UTW.COM". This will check the DNS server you have configured, look up the numerical IP address for UTW.COM, and then ping UTW's IP address. The advantage of the DNS is that you don't have to remember numerical IP addresses for all the Internet sites you want to access. _________________________________________________________________ Dot Address (or Dotted Decimal Notation) The common notation for IP addresses of the form 1.2.3.4; where each number represents one byte in the four-byte IP address. _________________________________________________________________ Electronic Frontier Foundation (EFF) A foundation that addresses social and legal issues arising from the impact of computers on society. _________________________________________________________________ Electronic Mail (Email) A method by which computer users can exchange messages with each other over a network. Email is probably the most widely-used communications tool on the Internet. There are many quirky conventions to Email, but most entail a "To:", "From:", and "Subject:" line. One of Email's advantages is its ability to be forwarded and replied to easily. If an email is badly received by a group or user, the sender is likely to get "flamed." _________________________________________________________________ Email See Electronic Mail. _________________________________________________________________ Email Address Your email address is made up of several parts. By convention, addresses use lowercase letters with no spaces. The first part of the address, the username, identifies a unique user on a server. The "@" (pronounced "at") separates the username from the host name. The host name uniquely identifies the server computer and is the last part of the Internet email address (for example, my email address is sjj@utw.com). Large servers, such as those used at universities or large companies sometimes contain multiple parts, called subdomains. Subdomains and the host name are separated by a "." (pronounced "dot"). The three-letter suffix in the host name identifies the kind of organization operating the server (some locations use a two-letter geographical suffix). The most common suffixes are: .com (commercial) .edu (educational) .gov (government) .mil (military) .net (networking) .org (non-commercial). Addresses outside of the U.S. sometimes use a two-letter suffix that identifies the country in which the server is located. Some examples are: .jp (Japan) .nl (The Netherlands) .uk (United Kingdom) .ca (Canada) .tw (Taiwan). _________________________________________________________________ Encryption The basis of network security. Encryption encodes network packets to prevent anyone except the intended recipient from accessing the data. _________________________________________________________________ Ethernet A standard and probably the most popular connection type for Local Area Networks (LANs). It was first developed by Xerox, and later refined by Digital, Intel and Xerox (see also "DIX"). In an Ethernet configuration, computers are connected by coaxial or twisted-pair cable where they contend for network access using a Carrier Sense Multiple Access with Collision Detection (CSMA/CD) paradigm. Ethernet can transfer information at up to 10 Megabit-per-second (Mb/s). _________________________________________________________________ FAQ Acronym for "Frequently Asked Questions." FAQs are widely available on the Internet and usually take the form of large, instructional text files. They are written on a wide variety of topics, and are usually the most up-to-date source for specialized information. _________________________________________________________________ Federal Networking Council (FNC) A collection of federal agencies that have heavy interests in federal networks using TCP/IP and the Internet. Representatives from DoD, DOE, DARPA, NSF, NASA and HHS are the major members of the FNC. _________________________________________________________________ File Transfer Protocol (FTP) The most widely-used way of downloading and uploading (getting and putting) files across an Internet connection. The File Transfer Protocol is a standardized way to connect computers so that files can be shared between them easily. There is a set of commands in FTP for making and changing directories, transferring, copying, moving, and deleting files. Formerly, all FTP connections were text based, but graphical applications are now available that make FTP commands as easy as dragging and dropping. Numerous FTP clients exist for a number of platforms. _________________________________________________________________ Finger A UNIX command that shows information about a user or group of users on the Internet. When executed, the Finger command usually returns the user's real name, whether or not they have unread mail, and the time and date of their last login. Finger also displays two files (if they exist) located in the home directory of the user you fingered. These two files (the .PLAN and the .PROJECT files.) are simply ASCII text files that can be entered by the user to display any information upon being fingered. To try this out, download a finger client (or type "FINGER" at the UNIX prompt) and try fingering "sjj@utw.com". _________________________________________________________________ Flame A negative response to an email message or newsgroup posting. If you post an article or send an email to an audience that deems your message inappropriate, expect to get "flamed." The most common recipients of flames are users who post commercial messages in public forums, those who post adult material in non-adult areas of the Internet, and users who post or send make racial or gender-biased comments. The worst sort of flame is known as a "mail-bomb," which occurs when the user being flamed open his or her email and receives a flood of letters with unusually long file attachments that make his or her computer "crash." _________________________________________________________________ Follow-up A reply to an email or newsgroup posting that continues the conversation or idea, known as a "thread." _________________________________________________________________ Freenet A network system made up of community-based bulletin board systems with email, information services, interactive communications, and conferencing. They are usually funded and operated by individuals or organizations much like public television. Freenet providers are part of the National Public Telecomputing Network (NPTN), a Cleveland-based organization that works to make computer networking services as freely available as public libraries. _________________________________________________________________ FTP See File Transfer Protocol. _________________________________________________________________ Gateway A kind of "go-between" device or program that passes information between networks that normally couldn't communicate. What used to be called a gateway is now called a router. Not to be confused with a protocol converter. _________________________________________________________________ Gopher An information search and retrieval tool used widely for research. Gopher information is stored hierarchically on computers across the Internet. It uses a simple protocol that allows a client to access information from a multitude of numerous Gopher servers at one time, creating what's known as "gopher space." The most common search tools in gopher are Veronica and Jughead. Gopher clients exist for most platforms. _________________________________________________________________ Hacker A computer user who works to understand the "ins and outs" of computers, networks, and the Internet in general. Hackers are generally benign, and are not to be confused with crackers. _________________________________________________________________ Host A computer that is attached to a network or the Internet. Hosts allow users on client machines to connect and share files or transfer information. Individual users communicate with hosts by using client application programs. _________________________________________________________________ Host Address The address of a host computer on the Internet. _________________________________________________________________ Hostname The name given a host computer connected to the Internet. _________________________________________________________________ HTML See HyperText Markup Language. _________________________________________________________________ Hypermedia The combination of hypertext and multimedia in an online document. _________________________________________________________________ Hypertext A type of text that allows embedded "links" to other documents. Clicking on or selecting a hypertext link displays another document or section of a document. Most World Wide Web documents contain hypertext. _________________________________________________________________ Hypertext Markup Language (HTML) The standard way to mark text documents for publishing on the World Wide Web. HTML is marked-up using "tags" surrounded by brackets. To see what tagged HTML text looks like, select the View Source feature from the menus in the program you are using to view this document now, and you'll see a display of the HTML text used to create this page. _________________________________________________________________ IMHO Acronym for "In My Humble Opinion." Generally seen in IRC, email, or Usenet postings. _________________________________________________________________ Integrated Services Digital Network (ISDN) A relatively new technology which combines voice and digital network services in a single medium. ISDN makes it possible for communications carriers to offer their customers digital data services as well as voice connections through a single line. CCITT defines the standards relating to ISDN. _________________________________________________________________ International Organization for Standardization (ISO) An organization of 89 member countries (founded in 1946) responsible for setting world standards in many electronics areas. Members of the ISO are the national standards organizations of the member countries. _________________________________________________________________ Internet A large, uncontrolled, unadministered, anarchic cyber-state that will soon take over the world! Basically, it's just everyone's computers hooked together. It's not a corporation, organization, or entity in itself. When you connect to the Internet, you actually become part of it. Always capitalized, the word Internet can also be referred to colloquially as the "Net." _________________________________________________________________ Internet Assigned Numbers Authority (IANA) The central registry for various Internet protocol parameters, such as port, protocol and enterprise numbers, and options, codes and types. The currently assigned values are listed in the "Assigned Numbers" document. If you'd like more information or want to request a number assignment, you can email IANA at "iana@isi.edu". _________________________________________________________________ Internet Protocol (IP) An industry standard, connectionless, best-effort packet switching protocol used as the network layer in the TCP/IP Protocol Suite. _________________________________________________________________ Internet Protocol Address (IP Address) The 32-bit address defined by the Internet Protocol. Every resource on the Internet has a unique numerical IP address, represented in dotted decimal notation. IP addresses are the closest thing the Internet has to phone numbers. When you "call" that number (using any number of connection methods such as FTP, HTTP, Gopher, etc.) you get connected to the computer that "owns" that IP address. _________________________________________________________________ Internet Service Provider (ISP) An ISP is a company that maintains a network that is linked to the Internet via a dedicated communication line, usually a high-speed link known as a T1. An ISP offers use of its dedicated communication lines to companies or individuals (like me) who can't afford $1,300 a month for a direct connection. Using a modem, you can dial up to a service provider whose computers will connect you to the Internet, typically for a fee. _________________________________________________________________ Internet Society (ISOC) A non-profit, professional organization that supports the technical evolution of the Internet and stimulates the interest of members of the scientific and academic communities, industry, and the public regarding technology and the applications of the Internet. The ISOC also promotes the development of new applications for the Internet by publishing a quarterly newsletter, the Internet Society News, and by and holding an annual conference, called INET. _________________________________________________________________ InterNIC Meaning "Internet information Center," InterNIC is the combined name for the providers of registration, information, and database services to the Internet. InterNIC is who you contact if you want to register a domain name on the Internet. _________________________________________________________________ IP See Internet Protocol. _________________________________________________________________ IP Address See Internet Protocol Address. _________________________________________________________________ IRC The world-wide "party line" of the '90s. IRC allows multiple users to converse in real time on different "channels." Channels (which have a "#" sign preceding their name) vary in traffic and content. Channel operators (or Ops) moderate the conversation, and have the ability to "kick" people from channels, or even ban them if their actions warrant it. IRC clients are available for nearly all platforms. _________________________________________________________________ ISDN See Integrated Services Digital Network. _________________________________________________________________ ISO See International Organization for Standardization. _________________________________________________________________ ISOC See Internet Society. _________________________________________________________________ LAN Acronym for "Local Area Network." LANs are now commonplace in most businesses, allowing users to send email and share resources such as files, printers, modems, etc. Currently, most larger companies are connection their LANs to the Internet, allowing users to connect to resources within or outside the LAN. _________________________________________________________________ Leased Line A dedicated, full-time connection used to link a user or network to an Internet Service Provider or another network. _________________________________________________________________ Listserv An automated mailing list distribution system. Listservs exist for a multitude of professional, educational, and special interest groups. Usually, you have to send an email to a Listserver with the subject "SUBSCRIBE listname" or something to that effect. You are then "subscribed" to that "mailing list" and (depending on the service) will receive regular mail from a single source or from all members who send email to the Listserver. Listserv was originally designed for the Bitnet/EARN network. _________________________________________________________________ Lurking Non-active participation on the part of a subscriber to an mailing list, a Usenet newsgroup, and IRC channel, a CUSEEME connection, or any other Internet communication device. If you're "lurking," you're generally just listening to the discussion. It's usually best to lurk if you're a beginner or if you are new to a communication group. This allows you to "get up to speed" on the history or acceptable behavior of the group. _________________________________________________________________ Mail Reflector A program that distributes files or information in response to requests sent via email. Many Listservs have mail reflectors. You can request documents of a reflector by sending message with the subject "SEND document name" or a similar command. Mail reflectors are also being used to provide FTP-like services for users with limited Internet access. _________________________________________________________________ Mailing List A list of email addresses used to forward messages to groups of people. When you subscribe to a mailing list, you receive all mail sent to that list (see also Listserv). _________________________________________________________________ MIME Encoding See Multipurpose Internet Mail Extensions Encoding. _________________________________________________________________ Mirror Site Due to the popularity of some FTP and Web sites, mirror sites came into existence. They are areas on a computer that "mirror" or contain an exact replica of the directory structure of another computer. If you have trouble getting connected to an FTP site, for example, because of the high amount of traffic, you can usually connect to a mirror site that contains the same information on a different computer. Mirror sites are usually updated once a day. _________________________________________________________________ Moderator The person who manages moderated mailing lists, newsgroups, or online discussion forums for services such as AOL, CompuServe, or the Microsoft Network. _________________________________________________________________ Mosaic A graphical browser for the World Wide Web that supports hypermedia. The NCSA (National SuperComputer Association) invented the Mosaic browser, which quickly became the industry standard. Recently, however, Netscape Communications has stormed the market with its freeware release of their Netscape Browser, which has radically redefined the Web. The term "Mosaic" is sometimes used incorrectly as a synonym for the World Wide Web. _________________________________________________________________ MUD Acronym for Multi-User Dungeon or Domain. MUDs are role-playing games that take place on a computer. Users can Telnet to a MUD host, and create a character. MUDs can be action-, adventure-, or fantasy-based games, and allow you to save your character for future play. Some MUDs have thousands of registered characters, and most foster a community or culture of their own. These are highly-addictive areas of the Internet, and users can spend many hours enthralled in this type of activity. _________________________________________________________________ Multipurpose Internet Mail Extensions Encoding (MIME Encoding) MIME is a standardized method for organizing divergent file formats. The method organizes file formats according to the file's MIME type. When Internet (usually email) software retrieves a file from a server, the server provides the MIME type of the file, and the file is decoded correctly when transferred to your machine. _________________________________________________________________ Netiquette The combination of the words "Net" and "etiquette," this refers to the proper behavior on a network, and more generally the Internet. The key element in Netiquette is remembering that actual people are on the other end of a computer connection, and offensive comments or actions are just as offensive even if you can't see your recipient. _________________________________________________________________ Network File System (NFS) A protocol developed by Sun Microsystems. NFS allows a computer to access and use files over a network as if they were local. This protocol has been incorporated into the products of more two-hundred companies, and is now a de facto Internet standard. _________________________________________________________________ Network News Transfer Protocol (NNTP) An industry standard protocol for the distribution, inquiry, retrieval, and posting of news articles. _________________________________________________________________ NFS See Network File System. _________________________________________________________________ NNTP See Network News Transfer Protocol. _________________________________________________________________ Open Systems Interconnection (OSI) A suite of protocols, designed by ISO committees to be the international standard computer network architecture. _________________________________________________________________ OSI See Open System Interconnection. _________________________________________________________________ Packet The common term for the standard unit of data sent across a network. _________________________________________________________________ Packet Internet Gopher (PING) The simplest way to test or time the response of an Internet connection. PING sends a request to an Internet host and waits for a reply (called a...yep.. you guessed it: PONG). When you PING an address, you get a response telling you the number of seconds it took to make the connection. PING clients exist for a number of platforms, or you can use a UNIX or Windows 95 prompt to issue a PING command directly. _________________________________________________________________ PAP See Password Authentication Protocol. _________________________________________________________________ Password Authentication Protocol (PAP) One of the many authentication methods that can be used when connecting to an ISP. PAP allows you to login automatically, without having to use a terminal window to type in your username and password. One warning about PAP: passwords are sent over the connection in text format, which means there is no protection if someone is "listening-in" on your connection. _________________________________________________________________ Point Of Presence (POP) An installation of telecommunications equipment, usually digital leased lines and multi-protocol routers. _________________________________________________________________ Point-to-Point Protocol (PPP) A protocol that provides a method for transmitting packets over serial point-to-point links. PPP is one of the most popular methods for dialup connections to the Internet, since it allows you to use other standard protocols (such as IPX, TCP/IP, and Netbeui) over a standard telephone connection, but it can also be used for LAN connections. _________________________________________________________________ POP See either Point Of Presence or Post Office Protocol. _________________________________________________________________ Post Office Protocol (POP) A protocol designed to allow single users to read mail from a server. There are three versions: POP, POP2, and POP3. When email is sent to you, it is stored on the server until accessed by you. Once you are authenticated, the POP is used to transmit the stored mail from the server to your local mailbox on your client machine. _________________________________________________________________ Posting The sending of an article to a Usenet newsgroup or the placing of a message on a BBS. _________________________________________________________________ PPP See Point-to-Point Protocol. _________________________________________________________________ Protocol Simply, the "language" spoken between computers to help them exchange information. More technically, it's a formal description of message formats and the rules that two computers must follow to exchange those messages. Protocols can describe low-level details of machine-to-machine interfaces (like the order in which bits and bytes are sent across a wire) or high-level exchanges between allocation programs (the way in which two programs transfer a file across the Internet). _________________________________________________________________ Read the Flippin' Manual (RTFM) An acronym used to respond to a simple or common question. _________________________________________________________________ Request For Comments (RFC) A document series, begun in 1969, which describes the Internet suite of protocols and related experiments. Not all (actually, very few) RFCs describe Internet standards, but all Internet standards are written up as RFCs. _________________________________________________________________ RFC See Request for Comments. _________________________________________________________________ Router A device that forwards traffic between networks. Forwarding decisions are made based on network layer information and routing tables, often constructed by routing protocols. _________________________________________________________________ Serial Line lnternet Protocol (SLIP) Similar to PPP, SLIP is another standard protocol used to run TCP/IP over serial lines, such as telephone circuits or RS-232 cables. Unlike PPP, however, SLIP does not work on a LAN connections. SLIP is probably the most popular way for dialup users to access the Internet. _________________________________________________________________ Server Simply, a computer that provides resources, such as files or other information. Common Internet servers include file servers and name servers Domain Name Service. _________________________________________________________________ Service Provider See Internet Service Provider. _________________________________________________________________ SIG Acronym for "Special Interest Group." SIGs sponsor a variety of Listservs, IRC channels, and Internet sites. _________________________________________________________________ Signature An ASCII text file that can be automatically attached to the bottom of a piece of email or newsgroup posting that identifies the sender. Many signatures (or "sigs") use symbols and characters to create images or words to make the sig more interesting. _________________________________________________________________ Simple Mail Transfer Protocol (SMTP) A protocol used to transfer email. SMTP transfers mail from server to server, and the end user must use POP (see also Post Office Protocol) to transfer the messages to their machine. _________________________________________________________________ Simple Network Management Protocol (SNMP) Developed to manage nodes on an IP network, SNMP is an Internet standard protocol. It can be used to manage wiring hubs, video toasters, CD ROM jukeboxes, and many other devices. _________________________________________________________________ SLIP See Serial Line Internet Protocol. _________________________________________________________________ Smiley The use of punctuation marks and other symbols or characters to portray moods when typing, especially in email messages and IRC. Here's an example of a simple smiley :) . If you don't see it, tilt your head to the left and look at it. The colon makes the eyes and the parenthesis makes the smiley mouth. The smile means happiness (like if someone says something funny) or it often denotes sarcasm. Other combinations of characters can express many other emotions. You may also hear them referred to as "emoticons". _________________________________________________________________ SRI A research institute based in California that runs the Network Information Center (NISC). _________________________________________________________________ Subnet Mask See Address Mask. _________________________________________________________________ T1 One of AT&T's terms used to denote the type of connection of a host to the Internet. A T1 transmits a DS-1 formatted digital signal at 1.544 megabits per second. _________________________________________________________________ T3 One of AT&T's terms used to denote the type of connection of a host to the Internet. A T3 transmits a DS-3 formatted digital signal at 44.746 megabits per second. _________________________________________________________________ TCP/IP See Transmission Control Protocol/Internet Protocol. _________________________________________________________________ TCP/IP Stack To properly use the TCP/IP protocol, PCs require a TCP/IP stack. This consists of TCP/IP software, sockets software (such as WINSOCK.DLL for Windows machines), and hardware driver software (known as packet drivers). Windows 95 comes with Microsoft's own built-in TCP/IP stack, including version 1.1 of Microsoft's WINSOCK.DLL and packet drivers. _________________________________________________________________ Telnet The Internet standard protocol to connect to remote terminals. Telnet clients are available for most platforms. When you Telnet to a UNIX site, for example, you can issue commands at the prompt as if the machine were local. _________________________________________________________________ TN3270 A slight variation of Telnet used to connect the user to an IBM mainframe. TN3270 clients exist for most platforms. _________________________________________________________________ Token Ring A type of LAN in which networked computers are wired into a "ring." Each computer (or node) is in constant contact with the next node in the ring. A control message, called a "token", is passed from one node to another, allowing the node with the token to send a message out to the network. If the ring is "broken" by one computer losing contact, the network can no longer communicate. The IEEE 802.5 token ring standard is the most common. _________________________________________________________________ Topology The "layout" of all the computers on a network and the links that join them. _________________________________________________________________ Transmission Control Protocol/Internet Protocol (TCP/IP) TCP/IP is the standard communications protocol required for Internet computers. To communicate using TCP/IP, PCs need a set of software components called a TCP/IP stack. Macintoshes typically use a proprietary software called MacTCP. Most UNIX systems are built with TCP/IP capabilities. _________________________________________________________________ UNIX-to-UNIX Copy (UUCP) Originally, UUCP was a program that allowed UNIX systems to transfer files over phone lines. Currently, the term is used to describe the protocol that passes news and email across the Internet. _________________________________________________________________ Usenet Usenet groups are more commonly known as "newsgroups." There are thousands of groups hosted on hundreds of servers around the world, dealing with various topics. Newsreader software is required to properly download and view "articles" in the groups, but you can usually "post" and article to a group simply by emailing to it. _________________________________________________________________ UUCP See UNIX-to-UNIX Copy. _________________________________________________________________ Veronica A search engine (not unlike Archie) that is built into Gopher. It allows searches of all gopher sites for files, directories and other resources. _________________________________________________________________ Universal Resource Locator (URL) More commonly referred to as the URL, the Universal Resource Locator refers to the entire address that is recognized "universally" as the address for an Internet resource. Each resource on the Internet has a unique URL. URLs begin with letters that identify the resource type, such as http, ftp, gopher, etc. These types are followed by a colon and two slashes. Next, the computer's name is listed, followed by the directory and filename of the remote resource. For example, the URL for this glossary is http://www.windows95.com/glossary.html. _________________________________________________________________ W3 See World Wide Web. _________________________________________________________________ WAIS See Wide Area Information Service. _________________________________________________________________ White Pages Databases containing email addresses, telephone numbers, and postal addresses of Internet users. You can search the Internet White Pages to find information about particular users. _________________________________________________________________ WHOIS An Internet program (related to Finger and the White Pages) that lets you enter an Internet entity (such as domains, networks, and hosts) and display information such as a person's company name, address, phone number and email address. _________________________________________________________________ Wide Area Information Service (WAIS) A distributed information service and search engine that allows natural language input and indexed searching. Many Web search utilities use a WAIS engine. _________________________________________________________________ Winsocks Stands for "Windows Sockets." Winsocks is a set of specifications or standards for programmers creating TCP/IP applications for use with Windows. _________________________________________________________________ World Wide Web (WWW or W3) The "Web" is a collection of online documents housed on Internet servers around the world. The concept of the Web was created by researchers at CERN in Switzerland. Web documents are written or "coded" in HTML. To access these documents, you have to use a Web browser, such as Netscape or Mosaic. When these browsers access (or hit) a page, the server uses the HyperText Transfer Protocol (HTTP) to send the document to your computer. _________________________________________________________________ Worm A computer program that replicates itself and is self-propagating. While viruses are designed to cause problems on a local system and are passed through boot sectors of disks and through files, worms are designed to thrive in network environments. Network worms were first defined by Shoch & Hupp of Xerox in ACM Communications (March 1982). The most famous (or infamous) worm was the Internet Worm of November 1988. It successfully propagated itself on over 6,000 systems across the Internet. _________________________________________________________________ WWW See World Wide Web. _________________________________________________________________ ©1995 Steve Jenkins Microsoft, MS, Windows, Windows 95, and the Windows logo are either registered trademarks or trademarks of Microsoft Corporation. Microsoft Corporation in no way endorses or is affiliated with Windows95.com. QuickTutors and QuickTutors 95 are registered trademarks of Usability Sciences Corporation. E-Ticket is a registered trademark of E-Ticket, Inc. All other trademarks are the sole property of their respective owners.