[ee122] updated Concepts list

vern at cs.berkeley.edu vern at cs.berkeley.edu
Fri Dec 7 11:12:11 PST 2007


7-Layer (really 5-Layer) Model
Access point
Ack-Every-Other
Ack-Splitting
Adaptor
Additive-Increase Multiplicative-Decrease
Admission Control
Application Gateway
Authentication
Authorization
Autonomous System
Availability
Best Effort Delivery
Bot
Botnet
Bridge
Broadcast
Buffer overflow
Bytestream
Cache Poisoning
Caching
Carrier Sense
Certificate  (sometimes abbreviated as "cert")
Checksum
Circuit Switching
Classful Addressing
Classless Interdomain Routing
Client-Server
Clock Recovery
Collision Avoidance
Collision Detection
Confidentiality
Congestion Avoidance
Congestion Control
Connection-oriented
Connectionless
Content Distribution Network
Cookie
Count-to-Infinity
Cryptographically Strong Hash Function
Cut-through
Data Plane vs. Control Plane
Datagram
Delayed Acknowledgment
Demultiplexing
Denial-of-Service
DiffServ
Distance Vector Routing
Distributed Denial-of-Service
Distributed Hash Table
Domain Name
Drop-Tail Queueing
Duplicate ACK
End-to-End Principle
Explicit Congestion Notification
Exponential Backoff
Exposed Terminal
Fair Queueing
Fast Recovery
Fast Retransmission
Fate Sharing
Firewall
Flow Control
Fragmentation
Frame
Gateway
Head-of-Line Blocking
Hidden Terminal
Hierarchical naming
Hub
IP Address vs. MAC Address
Initial Sequence Number
Input-queued router
IntServ
Integrity
Interdomain
Intradomain
Iterative query
Layering
Link State Routing
Little's Theorem
Local Area Network
Longest-Prefix-Matching Forwarding
Manchester Encoding
Marshalling
Max-Min Fairness
Media Access
Meta-data
Middlebox
Multiple Access
Multiplexing
Narrow Waist/Internet Hourglass
Negative Acknowledgment
Negative Caching
Network Address Translation
Network Neutrality
Network Prefix
Non-repudiation
Nonce
Output-queued router
Overlay
Overprovision
PMTU Discovery
Packet-Switching
Parity
Peer-to-Peer
Persistent HTTP
Pipelined HTTP
Point-to-Point
Poisoned Reverse
Port
Preamble
Private Address
Public Key Infrastructure
Public-Key Cryptography
Quality of Service
Random Early Detection
Recursive Query
Reliable Transfer
Reverse Lookup (DNS)
Revocation
Router
Scalability
Segment
Selective Acknowledgment
Self-Clocking
Sentinel
Sequence Number
Session Key
Sliding Window
Slotted Aloha
Slow Start
Socket
Soft State
Spanning Tree
Stateless Operation
Statistical Multiplexing
Stop-and-Wait
Store-and-Forward
Subnet Mask
Switch
Symmetric Key Cryptography
TCP Throughput Equation
Three-Way Handshake
Time-Sequence Plot
Time-To-Live
Token Bucket
Tunneling
Wide Area Network
Window Scaling
Worm


More information about the ee122 mailing list