Sie sind auf Seite 1von 18


A computer is an electronic machine that accepts data, stores and processes data into information. The
computer is able to work because there are instructions in its memory directing it.

The parts of the computer that you can see and touch, such as the keyboard, monitor and the mouse are
called hardware. The instructions that direct the computer are called software or computer program.

Data which is raw facts that you the user enter into the computer is called input. This includes; words,
numbers, sound and pictures. When the data is entered into the computer, the computer processes the
data to produce information which is output. For example, you enter 2+2 into the computer as data, the
computer processes it and the result is 4 which is information.

Input Devices -- "How to tell it what to do“ –

A keyboard and mouse are the standard way to interact with the computer. Other devices include
joysticks and game pads used primarily for games.

Output Devices -- "How it shows you what it is doing" - The monitor (the screen) is how the computer
sends information back to you. A printer is also an output devic

Computers are usually categories into three general categories:

1.Supercomputer – The fastest, largest, most powerful and most expensive computer.

2.Mainframe Computer – This is a little smaller and less powerful than the supercomputer, but, like the
supercomputer it is also expensive.

3.Personal Computer (PC)- This is the computer that most people use in their daily lives. This computer
is much smaller, less powerful and less expensive than the supercomputer and the mainframe computer.
There are two main types of personal computers. Macintosh (Macs) and the PC compatibles (PC). The
main differences between the two are the operating systems and the processor they use. This category
of computer has two additional types of computers. These are mobile computer and handheld
computer. The most popular type of mobile computer is the notebook or laptop computer, and the
handheld computer is a very small PC that you can hold in your hand.
It is important to note that, any computer; regardless of its size has an input device, output device and a
system unit.

The software is the instructions that makes the computer work. Software is held either on your
computers hard disk, CD-ROM, DVD or on a diskette (floppy disk) and is loaded (i.e. copied) from the
disk into the computers RAM (Random Access Memory), as and when required.


The Mouse Used to ‘drive’ Microsoft Windows

The Keyboard The keyboard is still the commonest way of entering information into a computer Tracker
Balls an alternative to the traditional mouse and often used by graphic designers


Scanners A scanner allows you to scan printed material and convert it into a file format that may be
used within the PC

Touch Pads A device that lays on the desktop and responds to pressure

Light Pens Used to allow users to point to areas on a screen

Joysticks Many games require a joystick for the proper playing of the game


VDU The computer screen is used for outputting information in an understandable format

Printers There are many different types of printers. In large organizations laser printers are most
commonly used due to the fact that they can print very fast and give a very high quality output


Plotters A plotter is an output device similar to a printer, but normally allows you to print larger images.

Speakers Enhances the value of educational and presentation products.

Speech synthesizers Gives you the ability to not only to display text on a monitor but also to read the
text to you

Storage Devices -- "How it saves data and programs“ –

Hard disk drives are an internal, higher capacity drive which also stores the operating system which runs
when you power on the computer. - "

Floppy" disk drives allow you to save work on small disks and take the data with you.
Hard Disks Speed: Very fast! The speed of a hard disk is often quoted as "average access time" speed,
measured in milliseconds. The smaller this number the faster the disk.

Capacity: Enormous! Often 40/80 Gigabytes. A Gigabyte is equivalent to 1024 Megabytes.

Cost: Hard disks costs are falling rapidly and normally represent the cheapest way of storing data

Diskettes (Floppy Disks) Speed: Very slow! Capacity: Normally 1.44 Mbytes. Cost: Very cheap.

CD-ROM Disks

Speed: Much slower than hard disks. The original CD-ROM speciation is given a value of 1x speed, and
later, faster CD-ROMs are quoted as a multiple of this value. Capacity: Around 650 Mbytes and more

DVD Drives Speed: Much faster than CD-ROM drives but not as fast as hard disks. Capacity: Up to 17
Gbytes. Cost: Slightly higher than CD-ROM drives

Memory -- "How the processor stores and uses immediate data“

RAM - Random Access Memory The main 'working' memory used by the computer

Memory ROM – Read Only Memory Read Only Memory (ROM) as the name suggests is a special type
of memory chip that holds software that can be read but not written to.

How Computer Memory Is Measured

Bit All computers work on a binary numbering system, i.e. they process data in one's or zero's. This 1 or
0 level of storage is called a bit.

Byte A byte consists of eight bits.

Kilobyte A kilobyte (KB) consists of 1024 bytes.

Megabyte A megabyte (MB) consists of 1024 kilobytes. Gigabyte A gigabyte (GB) consists of 1024

Microprocessors -- "The brain of the computer“ - PCs primarily use microprocessors (sometimes called
the chip). The older Intel versions include the 386, 486 and now the Pentium line.

The CPU (Central Processing Unit) is normally an Intel Pentium (or equivalent) and it is one of the most
important components within your computer.

Some of the Factors That Impact on a Computer's Performance

CPU speed RAM size Hard disk speed and capacity

Operating systems software The operating system is a special type of program that loads automatically
when you start your computer

Application Software

Word processing application Microsoft Word Lotus Word Pro WordPerfect


Microsoft Excel Lotus 123


Microsoft Access Lotus Approach

LAN A LAN (Local Area Network) is a system whereby individual PCs are connected together within a
company or organization

WAN A WAN (Wide Area Network) as the name implies allows you to connect to other computers over
a wider area (i.e. the whole world).

Modem Short for “MODulate/DEModulate”. The modem sends information from your computer
across the telephone system.

The A-Z of Technology Terms

Don't know your bandwidth from your back-end? Here's a handy glossary of tech terms.

Adobe Acrobat Reader

Acrobat Reader is software that allows you to view a PDF document (a document that can be seen
but not changed). It can be downloaded free of charge from Adobe.

Asymmetric digital subscriber line (ADSL) is a type of digital subscriber line (DSL) broadband
technology that is used to connect to the Internet. It uses standard telephone lines to deliver high-
speed data communications (up to 24 megabytes per second).

Analogue is a conventional method of transmitting data. Standard landline telephones use analogue
technology. It is distinct from digital technology, which provides for greater quality and speed of data

Assistive technology
Assistive technology refers to any software or hardware that acts to assist and improve the
functional capabilities of people with disabilities. Examples include wheelchairs, prosthetics, voice-
to-text technology and text-to-speech technology.

An attachment is a document sent with an email message. Many types of files can be sent this way
(e.g. Word documents, PDFs, Excel files, JPEGs). Be wary of attaching large files because these
can take a lot of time for the recipient to download. If you have a large file, it is considered good
practice to compress the file using software such as Winzip before attaching it.

Back-end refers to the part of an application that performs an essential task not apparent to the user.

Backward compatible
If software is backward compatible, it is compatible with earlier (superseded) versions of the same
software. For example, the Microsoft word-processing program Word 2010 can read files created in
the 2003 version of the same program, so it is backward compatible.

Bandwidth refers to the maximum amount of data that can travel a communications path in a given
time, usually measured in seconds.

A bit (short for binary digit) is the smallest unit of measurement in computing. 8 bits make up 1 byte.

Bluetooth is a wireless communications technology intended to replace cables. It allows short-range
connections between two or more Bluetooth-compatible devices such as mobile phones, tablets,
headsets or medical equipment.

A bookmark is a saved link to a particular Web page. Microsoft Internet Explorer denotes bookmarks
as "favourites."

Boolean operators
Most search engines (e.g. Google) allow you to limit your search or make it more specific by using
words such as "and", "or" and "not". These words are known as boolean operators because of their
origin as terms in logic.

Boot (re-boot)
To boot (or re-boot) is to load and initialise the operating system on a computer. Think of it as starting
up your computer. In Windows you can use the key combination CTRL and ALT and DEL as a "soft"
boot. This means restarting the computer rather than turning it completely off and on again, which
could cause damage to your computer's hard disk under some circumstances.

Bounce back
An email message that cannot be delivered and returns an error notification to the sender is said to
"bounce back". If you receive such an error notification, check that you have typed the address
Broadband is a type of communications technology whereby a single wire can carry more than one
type of signal at once; for example, audio and video. Cable TV is one technology that uses
broadband data transmission.

A software program that allows you to surf the web. Popular web browsers include Google Chrome,
Mozilla Firefox, Microsoft Edge and Internet Explorer.

When you download (read) a web page, the data is "cached," meaning it is temporarily stored on
your computer. The next time you want that page, instead of requesting the file from the web server,
your web browser just accesses it from the cache, so the page loads quickly. The downside to this is
that if the cached web page is often updated, you may miss the latest version. If you suspect that the
web page you're seeing is not the latest version, use the "refresh" button on your browser.

Computer-aided design (CAD) is a type of software that allows users to create 2D and 3D design
and modelling. CAD is used by architects, engineers, artists and other professionals to create
precise technical drawings.

A chip is a microprocessor that performs many functions and calculations that make your computer
run. Your computer's chip is also referred to as the CPU (Central Processing Unit) or the processor.

Cloud computing
Cloud computing refers to the storing and accessing of data and programs over the Internet instead
of on another type of hard drive. Examples of Cloud services include iCloud, Google Cloud and

Compression is the reduction of the size of a file. Compressed files take up less memory and can be
downloaded or sent over the Internet more quickly.

Content refers to a website's text and information, as opposed to its design and structure.

A piece of code or data created by a web server and stored on a user's computer. It is used to keep
track of the user's usage patterns and preferences.

The central processing unit (CPU) is the brains behind your computer. The CPU is responsible for
performing calculations and tasks that make programs work. The higher the speed of a CPU, the
faster the CPU undertakes the calculations and tasks.
Cybercrime is any type of illegal activity that is undertaken (or relies heavily) on a computer. There
are thousands of types of cybercrime, including network intrusions, identity theft and the spreading
of computer viruses.

Cybersecurity refers to measures designed to protect your computer, device or network from
cybercrime. This involves preventing unintended and unauthorised access, change and damage.

Device driver
A device driver is a small program that allows a peripheral device such as a printer or scanner to
connect to your PC.

A domain is a set of computers on a network that are managed as a unit.

Downloading is the method by which users access and save or "pull down" software or other files to
their own computers from a remote computer via the Internet.

DV stands for digital video.

Email or electronic mail is a way of sending messages over the internet. Popular email programs
include Outlook, Mozilla Thunderbird, Gmail and Yahoo Mail.

Encryption is the process of converting electronic data to an unrecognisable or encrypted form, one
that cannot be easily understood by unauthorised parties.

Ethernet is the most common way of connecting computers on a network with a wired connection. It
is a type of local area network (LAN) technology, providing a simple interface for connecting multiple

A firewall is a barrier that acts as a security system to protect trusted computer systems and
networks from outside connections and untrusted networks, such as the Internet.

File transfer protocol (FTP) is a common method of transferring files via the internet from one host to
another host.

A point within a network that interconnects with other networks.

Graphics interchange format (GIF) is a graphics file format. Because GIF files are compressed, they
can be quickly and easily transmitted over a network. GIF is one of the main graphics formats on the

Hard disk
The physical place where a computer stores information - applications and files - is known as its
hard disk drive (HDD). The bigger the HDD, the more data it can store.

Home page
The page that an Internet browser first opens up to. It is usually the starting point of an organisation's
or individual's website.

Hyper-text markup language (HTML) is a set of symbols inserted into files intended for display on
the world wide web. The symbols tell web browsers how to display words and images - e.g. which
colour, font and type size to use - and they direct it to link to other pages on the world wide web via

A set of interconnected networks that allow computers in different locations to exchange information.
The Internet includes services such as the world wide web, electronic mail, file transfer protocol
(FTP), chat and remote access to networks and computers.

An internet service provider (ISP) is a company that provides access to the Internet. In Australia,
widely used ISPs include Bigpond, iinet and Dodo.

An intranet is basically a private, internal internet specific to an organisation or group.

Java is a programming language that is commonly used in the development of client-server web

JPEG stands for Joint Photographic Experts Group, which was the committee that created the file
format known as JPEG. The format is commonlyl used for photos displayed on the world wide web.

A local area network (LAN) is a system that connects computers and other devices that share a
common communications line and wireless link, generally within a limited geographical area such as
a home or office building.

"Malware" is short for malicious software. It refers to a software program that has been developed to
do harm to other computers. Types of malware include viruses, worms and spyware.

A measure of computer processor storage and real and virtual memory. A megabyte (Mb) is 2 to the
20th power bytes, or 1,048,576 bytes in decimal notation.

Megahertz is the unit used to measure the speed of a computer's processor (e.g. 2.8Ghz)

A modem is a device that allows computers to transmit information to each other via ordinary
telephone lines.

If a computer (or computer user) is online, it is currently connected to a network or to the Internet.
Online also refers to resources and services available on the Internet - e.g. online banking, online

Operating system
An operating system (OS) is the software that manages all of a computer's processes and allows
programs and applications to run. The most prominent operating system is Microsoft Windows.
Others include Mac OS X and Linux.

Portable document format (PDF) is a file type created by Adobe Systems Inc. PDFs can be read
using free software called Adobe Acrobat Reader or another PDF reader.

Phishing is a type of email fraud in which the perpetrator sends out emails that appear to come from
a legitimate service or reputable company, such as a bank or an email service provider. These
emails aim to lure recipients to reveal confidential information that the perpetrator can use for their
financial advantage - for example, online banking log-in details and passwords.

A software plug-in is a component that adds to a software program's functionality.

A Post office protocol (POP) is an Internet protocol used by your Internet service provider (ISP) to
handle email. A POP account is an email account.

Pages per minute (PPM) generally refers to the speed of a printer.

The processor is the brains of your computer. It is responsible for performing calculations and tasks
that make programs work. The faster the processor, the faster the computer works.

A protocol is a standard or set of rules that computers and other devices use when communicating
with one another.

Random access memory (RAM) is usually referred to as a computer's "memory" - it stores
information used by programs. Generally, the larger your computer's RAM, the more programs it can
run at once without slowing down.

A read-only file cannot be edited, modified or deleted.

Resolution refers to the number of distinct pixels that make up the display on a computer monitor. It
is denoted in DPI (dots per inch). The higher the resolution, the finer and smoother the images
appear when displayed at a given size.

ROM stands for read-only memory. It is the part of a computer's memory that cannot be changed by
a user. The contents of ROM remain even when the computer is turned off.

SAAS stands for software as a service. It is a software distribution model whereby software
applications are centrally hosted and licensed on a subscription basis.

Search engine
A search engine enables a computer user to search information on the Internet. It is a type of
software that creates indexes of databases or Internet sites based on the titles of files, keywords, or
the full text of files. The most popular search engines
are, and

SSL, or secure sockets layer, is a protocol that allows Internet users to send encrypted messages
across the Internet. It is generally used when transmitting confidential information (e.g. personal data
or credit card details). A web address that begins with "https" indicates that an SSL connection is in

SEO, or search engine optimisation, is the practice of making adjustments to certain aspects of a
website in an effort to improve its ranking on search engines.

A server is a computer that handles requests for data, email, file transfers, and other network
services from other computers.

Spam refers to unsolicited email messages sent for marketing purposes.

To unzip a zip file is to extract and decompress compressed files from it. If you are sent a zip file via
email, you will need to unzip it before you can access the files inside it.

A URL (unique resource locator) or web address is the string of characters you type into a browser to
access a particular website or other resource on the Internet. (eg. )

If an online video, photo or article "goes viral", it experiences a sudden spike in popularity in a short
period of time.

A virus is a piece of programming code inserted into other programming to cause damage. Viruses
can be sent in many forms but are often transmitted via email messages that, when opened, may
erase data or cause damage to your hard disk. Some viruses are able to enter your email system
and send themselves to other people in your list of contacts.

Wired equivalent privacy (WEP) is a security protocol used in wi-fi networks. It is designed to provide
a wireless local area network (LAN) with a level of security similar to that of a regular wired LAN.
WEP-secured networks are usually protected by passwords. (See also WAP.)

Wi-Fi is a technology that allows computers and other devices to communicate via a wireless signal.
Essentially, it means you can browse the internet without tripping over phone cords.

Wi-Fi protected access (WPA) is a security protocol used in wi-fi networks. It is an improvement on
WEP because it offers greater protection through more sophisticated data encryption.

To zip files is to archive and compress them into one file of smaller size using a program such as
WinZip. It's a handy way to make files smaller before sending them via email.
The table below lists information technology initialisms and acronyms in common and current usage.
These acronyms are used to discuss LAN, internet, WAN, routing and switching protocols, and their
applicable organizations.[1][2][3] The table contains only current, common, non-proprietary initialisms
that are specific to information technology. Most of these initialisms appear in IT career certification

Acronym Meaning Primary Applicability[4] Normative Reference

ACK Acknowledgement Transport and other layers TCP/IP, for example. RFC 793

ACL Access control list Security, application layer Access control list, Cisco overview

ADSL Asymmetric digital subscriber line Telecom ITU-T G.992.5 Annex M, for example

AES Advanced Encryption Standard Security U.S. FIPS PUB 197

ANSI American National Standards Institute Organization ANSI

API Application Programming Interface Software

ARP Address Resolution Protocol Link layer RFC 1122

ATM Asynchronous Transfer Mode Telecom ATM cell description

BGP Border Gateway Protocol (routing protocol) Application layer, Routers RFC 4271

BSS Basic service set (Wi-Fi) Wireless IEEE Std 802.11-2007

CAT Category (e.g. CAT-5 cable) Physical layer ANSI/TIA/EIA-568-B.1-2001

CCITT (obs.) Standards organization that has been replaced by ITU-T Organization ITU-T

CHAP Challenge-Handshake Authentication Protocol (PPP) Security, telecom RFC 1994

CIDR Classless Inter-Domain Routing Architecture RFC 1518 RFC 1519

CIR Committed Information Rate (Frame Relay) Telecom RFC 1490 RFC 1973 RFC 2427

CLI Command line interpreter Hardware Catalyst 6500 Series Command Reference, 7.6,
for example

CPE Customer premises equipment Telecom Telecom Glossary

CPU Central processing Unit Microprocessor Wikipedia

CRC Cyclical redundancy check Link and other layers 24 References here.

CRC-16-CCITT Cyclical redundancy check (X.25, HDLC) Link layers Reference on CRC page.

CRT Cathode Ray Tube Television set, Computer Monitor Cathode ray tube

CSMA/CA Carrier sense multiple access / collision avoidance Wireless IEEE Std 802.11

CSMA/CD Carrier sense multiple access / collision detection Physical layer IEEE Std

CSU/DSU Channel service unit / data service unit Telecom Telecom Glossary

CMOS Comp metal-oxide semiconductor Utillity Wikipedia

DAM Database activity monitoring Security Wikipedia[5]

DAM Digital asset management Internet Layer Wikipedia[6]

DCE Data communications equipment Telecom -Telecom Glossary

DEC (obs.) Digital Equipment Corporation Organization Purchased by Compaq in 1998. Merged
with Hewlett-Packard 2002.

DES Data Encryption Standard (obs. See AES)Security Federal Information Processing
Standard (FIPS) FIPS-46-3

DHCP Dynamic Host Configuration Protocol Application layer, Internet Layer RFC 2131 and others

DNS Domain Name System Application layer Over 30 RFCs here.

DRAM Dynamic random-access memory Hardware

DSL Digital Subscriber Line Telecom Telecom Glossary

DSLAM Digital Subscriber Line Access Multiplexor Telecom Telecom Glossary (proposed)

DTE Data Terminal Equipment Telecom Telecom Glossary

DMI Desktop Management Interface Utillity Wikipedia

EHA Ethernet Hardware Address (MAC address) Link layer IEEE Std 802 IEEE OUI

EIA Electronics Industry Alliance Organization EIA

EIGRP Enhanced Interior Gateway Routing Protocol Internet Layer Cisco Doc ID: 16406

EOF End Of Frame (HDLC, etc.) Link layer HDLC framing

ESS Extended service set (Wi-Fi group) Wireless IEEE Std 802.11-2007

FCC Federal Communications Commission (US) Organization US FCC

FCS Frame check sequence (Ethernet) Link layer Ethernet Frame IEEE Std 802.3

FDDI Fiber Distributed Data Interface Link layer American National Standards Institute X3T9.5
(now X3T12), ISO/IEC 9314-x

FTP File Transfer Protocol Application layer RFC 959 and others

GBIC Gigabit interface converter Hardware Seagate Specification

gbps Gigabit per second Physical layer Gigabit per second

GEPOF Gigabit Ethernet (over) Plastic Optical Fiber Physical layer IEEE P802.3bv

HDLC High-level Data Link Control Link layer ISO 13239

HTTP HyperText Transfer Protocol Application layer W3C Change History for HTTP
HTTPS HyperText Transfer Protocol Secure Transport and other layers SSL 3.0 Specification

IANA Internet Assigned Number Authority Organization IANA

ICMP Internet Control Message Protocol Internet Layer RFC 792

IDF Intermediate distribution frame Physical layer Structured cabling or Telecom Glossary

IDS Intrusion Detection

IEEE Institute for Electrical and Electronic Engineers Organization IEEE

IETF Internet Engineering Task Force Organization IETF

IMAP Internet Message Access Protocol Application layer RFC 3501

IP Internet Protocol Internet Layer RFC 791 RFC 1606

IPS Intrusion prevention system Security "NIST - Guide to Intrusion Detection and
Prevention Systems (IDPS)". 2007-02. Retrieved 2010-08-24.

IS-IS Intermediate System to Intermediate System (routing protocol) Internet Layer ISO/IEC

ISDN Integrated Services Digital Network Telecom IEC Area 716-xx

ISP Internet service provider Telecom Telecom Glossary

ITU-T International Telecommunications Union Organization

kbps Kilobit per second Physical layer Kilobit_per_second

LACP Link Aggregation Control Protocol Data link layer

LAN Local area network Link and other layers Telecom Glossary

LAPB Link Access Procedure, Balanced (x.25) Telecom ITU-T Recommendation X.222

LAPF Link-access procedure for frame relay Telecom RFC 1490

LLC Logical link control Link layer Telecom Glossary

MAC Media access control Link layer IEEE Std 802.3 and 802.11, for example

MAM Media access management (related to Digital asset management) Internet layer

MAN Metropolitan area network Telecom Telecom Glossary

Mbps Megabits per second Physical layer Megabit_per_second

MC Multiple choice IT Professional Certification About certification exams

MDF Main distribution frame Physical layer Glossary See also Structured cabling

MIB Management information base (SNMP) Application layer RFC 3418

MoCA Multimedia over Coax Alliance Organization Multimedia over Coax Alliance

MPLS Multiprotocol Label Switching network technology

MTU Maximum Transmission Unit Multiple layers

NAC Network access control Link and other layers IEEE 802.1x

NAT Network Address Translation Internet Layer Cisco Internet Protocol Journal: A look Inside
Network Address Translators

NBMA Non-Broadcast Multiple Access (e.g. Frame Relay ATM) Telecom See ATM, Frame Relay
and X.25, for examples.

NIC Network Interface Card Physical layer Telecom Glossary

NRZ Non-return-to-zero Physical layer Federal Standard 1037C

NRZI Non-return to zero inverted Physical layer Federal Standard 1037C

NVRAMNon-volatile RAM Hardware Sample vendor data here

OSI Open System Interconnect (joint ISO and ITU standard) Organization ISO/IEC 9594-5:2005
Open Systems Interconnection Protocol Specifications

OSPF Open Shortest Path First (routing protocol) Internet Layer RFC 2238

OUI Organization Unique Identifier Link and other layers IEEE OUI Assignments

PAP Password authentication protocol Security RFC 1334

PAT Port address translation Internet Layer RFC 1918

PC Personal computer (host) Hardware

PIM Personal information manager Software category

PIM Privileged Identity ManagementSoftware category

PCM Pulse-code modulation Physical layer ITU-T G.711

PDU Protocol data unit (such as segment, packet, frame, etc.) Multiple layers Fed Std 1037C

POP3 Post Office Protocol, version 3 Application layer RFC 1939

POP Point of presence Telecom Telecom Glossary

POST Power-on self test Hardware Cisco Catalyst 2800 User Guide, for example

POTS Plain old telephone service Telecom Telecom Glossary

PPP Point-to-point Protocol Telecom RFC 1661

PPTP Point-to-Point Tunneling Protocol Telecom RFC 2637

PTT Public Telephone and Telegraph Telecom Telecom Glossary or Free Dictionary

PVST Per-VLAN Spanning TreeLink layer Cisco's introduction to Spanning Tree Protocol

RADIUS Remote Authentication Dial-In User Service Security RFC 2865

RAM Random Access Memory Physical layer Telecom Glossary

RARP Reverse ARP Link layer RFC 903

RFC Request for Comments Multiple layers IETF's RFC Index

RIP Routing Information Protocol Internet Layer RFC 2453, for RIP version 2

RLL Run-Length Limited Physical layer RLL is used in a wide range of encodings.

ROM Read-Only Memory Hardware Telecom Glossary

RSTP Rapid Spanning Tree Protocol Link layer IEEE 802.1w - Rapid Reconfiguration of
Spanning Tree

RTP Real-time Transport Protocol Application layer RFC 3550

RCP Royal College of Physicians Gibson layer RFC 69

SDLC Synchronous Data Link Control Link layer Cisco Technology Handbook: SDLC and

SDN Software Defined Networking Architecture Software-defined networking

SFD Start-of-frame delimiter (Ethernet, HDLC, etc.) Link layer IEEE 802.3 (Ethernet), or RFC
2687 (HDLC), for examples

SFP Small form-factor pluggable Hardware Seagate Specification

S-HTTP Secure HTTP (rarely used) Transport and other layers RFC 2660 See also https

SLARP Serial Line ARP (Address Resolution Protocol) Link and other layers Archived Cisco Serial
Line Encapsulation extension
SLIP Serial Line Internet Protocol (obs.) Telecom RFC 1055

SMTP Simple Mail Transfer Protocol Application layer RFC 5321

SNA Systems Network Architecture (IBM) Multiple layers SNA Protocol Suite

SNAP SubNet Access Protocol Link layer IEEE 802 Overview and Architecture

SNMP Simple Network Management Protocol Application layer RFC 1155, RFC 3410 thru RFC
3418 and others

SOF Start of frame Link layer IEEE 802.3 (Ethernet), or RFC 2687 (HDLC), for examples

SRAM Static random access memory Hardware PC Guide's Definition

SSH Secure shell Application layer RFC 4252

SSID Service set identifier (Wi-Fi) Wireless IEEE 802.11

STP Spanning Tree Protocol Link layer Cisco's Introduction to Spanning Tree Protocol

SYN (TCP) Synchronization Link and other layers RFC 793 and many others

TCP/IP Transmission Control Protocol/Internet Protocol Transport layer RFC 793 and many others

TDM Time-division multiplexing Physical layer Fed Std 1037C

TFTP Trivial File Transfer Protocol Application layer RFC 1350

TIA Telecommunications Industry Alliance Organization Telecommunications Industry


TOFU Trust On First Use Security Improving SSH-style Host Authentication with Multi-
Path Probing

UDP User Datagram Protocol Transport layer RFC 768

USB Universal Serial Bus Physical and other layers USB 3.0 Specification

UTP Unshielded twisted pair PhysicalMany versions are defined by TIA, such as: TIA-568-B

VC Virtual circuit Transport and other layers Telecom Glossary

VLAN Virtual local area network Link layer IEEE 802.1Q

VLSM Variable-length subnet masking Architecture RFC 1518 RFC 1519

VPN Virtual private network Application layer Virtual Private Network Consortium

W3C World Wide Web Consortium Organization W3C

WAN Wide-area network Telecom Telecom Glossary

WEP Wired Equivalent Privacy Wireless IEEE 802.11

Wi-Fi IEEE 802.11 (Wi-Fi Alliance) Wireless Wi-Fi Alliance

WPA Wi-Fi Protected Access Security IEEE 802.11i

www World Wide Web