42 relations: Address space, Autonomous system (Internet), Border Gateway Protocol, Broadcasting (networking), Connection-oriented communication, Connectionless communication, Content delivery network, Denial-of-service attack, Domain Name System, Failover, Geocast, High availability, Hypertext Transfer Protocol, ICANN, Institute of Electrical and Electronics Engineers, Interior gateway protocol, Internet Engineering Task Force, Internet Protocol, IPv4, IPv6, IPv6 transition mechanism, Line hunting, Man-in-the-middle attack, Multicast, Multihoming, Onion routing, Open Shortest Path First, Packet Clearing House, Packet drop attack, Point of presence, Root name server, Routing, Scalability, State (computer science), Stateless protocol, Transmission Control Protocol, Transport Layer Security, Unicast, United States, User Datagram Protocol, Workaround, 6to4.
In computing, an address space defines a range of discrete addresses, each of which may correspond to a network host, peripheral device, disk sector, a memory cell or other logical or physical entity.
Within the Internet, an autonomous system (AS) is a collection of connected Internet Protocol (IP) routing prefixes under the control of one or more network operators on behalf of a single administrative entity or domain that presents a common, clearly defined routing policy to the Internet.
Border Gateway Protocol (BGP) is a standardized exterior gateway protocol designed to exchange routing and reachability information among autonomous systems (AS) on the Internet.
In computer networking, telecommunication and information theory, broadcasting is a method of transferring a message to all recipients simultaneously.
Connection-oriented communication is a network communication mode in telecommunications and computer networking, where a communication session or a semi-permanent connection is established before any useful data can be transferred, and where a stream of data is delivered in the same order as it was sent.
Connectionless communication, often referred to as CL-mode communication,Information Processing Systems - Open Systems Interconnection, "Transport Service Definition - Addendum 1: Connectionless-mode Transmission", International Organization for Standardization, International Standard 8072/AD 1, December 1986.
A content delivery network or content distribution network (CDN) is a geographically distributed network of proxy servers and their data centers.
In computing, a denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.
The Domain Name System (DNS) is a hierarchical decentralized naming system for computers, services, or other resources connected to the Internet or a private network.
In computing and related technologies such as networking, failover is switching to a redundant or standby computer server, system, hardware component or network upon the failure or abnormal termination of the previously active application, server, system, hardware component, or network.
Geocast refers to the delivery of information to a group of destinations in a network identified by their geographical locations.
High availability is a characteristic of a system, which aims to ensure an agreed level of operational performance, usually uptime, for a higher than normal period.
The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed, collaborative, and hypermedia information systems.
The Internet Corporation for Assigned Names and Numbers (ICANN) is a nonprofit organization responsible for coordinating the maintenance and procedures of several databases related to the namespaces and numericalspaces of the Internet, ensuring the network's stable and secure operation.
The Institute of Electrical and Electronics Engineers (IEEE) is a professional association with its corporate office in New York City and its operations center in Piscataway, New Jersey.
An interior gateway protocol (IGP) is a type of protocol used for exchanging routing information between gateways (commonly routers) within an autonomous system (for example, a system of corporate local area networks).
The Internet Engineering Task Force (IETF) develops and promotes voluntary Internet standards, in particular the standards that comprise the Internet protocol suite (TCP/IP).
The Internet Protocol (IP) is the principal communications protocol in the Internet protocol suite for relaying datagrams across network boundaries.
Internet Protocol version 4 (IPv4) is the fourth version of the Internet Protocol (IP).
Internet Protocol version 6 (IPv6) is the most recent version of the Internet Protocol (IP), the communications protocol that provides an identification and location system for computers on networks and routes traffic across the Internet.
An IPv6 transition mechanism is a technology that facilitates the transitioning of the Internet from the Internet Protocol version 4 (IPv4) infrastructure in use since 1983 to the successor addressing and routing system of Internet Protocol Version 6 (IPv6).
In telephony, line hunting (or hunt group) is the method of distributing phone calls from a single telephone number to a group of several phone lines.
In cryptography and computer security, a man-in-the-middle attack (MITM) is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.
In computer networking, multicast is group communication where data transmission is addressed to a group of destination computers simultaneously.
Multihoming is the practice of connecting a host or a computer network to more than one network.
Onion routing is a technique for anonymous communication over a computer network.
Open Shortest Path First (OSPF) is a routing protocol for Internet Protocol (IP) networks.
Packet Clearing House or PCH is the international organization responsible for providing operational support and security to critical Internet infrastructure, including Internet exchange points and the core of the domain name system.
In computer networking, a packet drop attack or blackhole attack is a type of denial-of-service attack in which a router that is supposed to relay packets instead discards them.
A point of presence (PoP) is an artificial demarcation point or interface point between communicating entities.
A root name server is a name server for the root zone of the Domain Name System (DNS) of the Internet.
Routing is the process of selecting a path for traffic in a network, or between or across multiple networks.
Scalability is the capability of a system, network, or process to handle a growing amount of work, or its potential to be enlarged to accommodate that growth.
In information technology and computer science, a program is described as stateful if it is designed to remember preceding events or user interactions; the remembered information is called the state of the system.
In computing, a stateless protocol is a communications protocol in which no information is retained by either sender or receiver, meaning that they are agnostic of the state of one another.
The Transmission Control Protocol (TCP) is one of the main protocols of the Internet protocol suite.
Transport Layer Security (TLS) – and its predecessor, Secure Sockets Layer (SSL), which is now deprecated by the Internet Engineering Task Force (IETF) – are cryptographic protocols that provide communications security over a computer network.
200px In computer networking, unicast refers to a one-to-one transmission from one point in the network to another point; that is, one sender and one receiver, each identified by a network address.
The United States of America (USA), commonly known as the United States (U.S.) or America, is a federal republic composed of 50 states, a federal district, five major self-governing territories, and various possessions.
In computer networking, the User Datagram Protocol (UDP) is one of the core members of the Internet protocol suite.
A workaround is a bypass of a recognized problem or limitation in a system.
6to4 is an Internet transition mechanism for migrating from Internet Protocol version 4 (IPv4) to version 6 (IPv6), a system that allows IPv6 packets to be transmitted over an IPv4 network (generally the IPv4 Internet) without the need to configure explicit tunnels.