Here is a table of the Internet Standards alphabetized in each table according to its designated letter and their relative descriptions:
| Standard | Description |
|---|
| Acct URI scheme | Uniform Resource Identifier scheme for accounting |
| Address Resolution Protocol | Protocol used for mapping an IP address to a physical address |
| Admission control | Process of regulating access to a network or service |
| Aggregate Server Access Protocol | Protocol for accessing aggregated server resources |
| ALTO (protocol) | Application-Layer Traffic Optimization protocol |
| Archie (search engine) | Early search engine for locating FTP files |
| Architecture for Control Networks | Framework for control networks |
| AS1 (networking) | Autonomous System 1 in computer networking |
| AS2 | Applicability Statement 2 in computer networking |
| Automatic switched-transport network | Network that automatically sets up and tears down connections |
A Table
| Standard | Description |
|---|
| Base62 | Base encoding scheme using alphanumeric characters |
| Base64 | Base encoding scheme using 64 characters |
| Berkeley r-commands | Set of remote commands used in UNIX systems |
| Bidirectional Forwarding Detection | Protocol for detecting and monitoring network paths |
| Bootstrap Protocol | Protocol for dynamically assigning IP addresses |
| Border Gateway Multicast Protocol | Routing protocol for IP multicast traffic |
| Border Gateway Protocol | Routing protocol for exchanging routing information |
B Table
| Standard | Description |
|---|
| CCSO Nameserver | Nameserver used in early internet systems |
| CE-HTML | Markup language for digital TV applications |
| Certificate Management over CMS | Protocol for managing certificates using CMS |
| Certificate Management Protocol | Protocol for managing certificates |
| Classless Inter-Domain Routing | IP addressing scheme for efficient routing |
| Clearinghouse for Networked Information Discovery and Retrieval | Early internet search and discovery service |
| CRAM-MD5 | Authentication mechanism using MD5 and HMAC |
| Cryptographic Message Syntax | Syntax for secure transmission of messages |
C Table
| Standard | Description |
|---|
| Data URI scheme | URI scheme for embedding data in a URI |
| Default-free zone | Part of the internet where all routers agree on default route |
| Deterministic Networking | Networking approach with predictable behavior |
| DHCP snooping | Security feature for filtering DHCP messages |
| Diameter (protocol) | Authentication, authorization, and accounting protocol |
| Diameter Credit-Control Application | Application for credit-control services using Diameter |
| Differentiated services | Quality of Service model for network traffic |
| Directory information tree | Structure for organizing and accessing directory information |
| DNS-based Authentication of Named Entities | Protocol for authenticating domain name owners |
| Domain Name System | System for translating domain names to IP addresses |
| Domain Name System Security Extensions | Extensions for securing DNS communications |
| Dynamic Host Configuration Protocol | Protocol for dynamically assigning IP addresses |
D Table
| Standard | Description |
|---|
| Endpoint Handlespace Redundancy Protocol | Protocol for redundancy in endpoint handlespace |
| Enriched text | Markup language for enriched text |
| Enrollment over Secure Transport | Protocol for secure enrollment of certificates |
| Ephemeral port | Temporary port used for network communication |
| Exterior gateway protocol | Protocol for exchanging routing information between autonomous systems |
| Exterior Gateway Protocol | Routing protocol for exchanging routing information |
| External Data Representation | Data representation format used in network communication |
E Table
| Standard | Description |
|---|
| Fast and Secure Protocol | Protocol for secure and efficient communication |
| FAST TCP | TCP congestion control algorithm |
| File Transfer Protocol | Protocol for transferring files over a network |
| File URI scheme | URI scheme for accessing files on a network |
| Finger (protocol) | Protocol for retrieving user information from a remote system |
| FTPS | File Transfer Protocol with SSL/TLS encryption |
F Table
| Standard | Description |
|---|
| G.9963 | ITU-T standard for home networking over power lines |
| G.9970 | ITU-T standard for broadband access over power lines |
| G.hn | ITU-T standard for high-speed home networking |
| Generalized Multi-Protocol Label Switching | Protocol for forwarding packets in a network |
| Generic Security Services Application Program Interface | API for security services |
| Gopher (protocol) | Early protocol for accessing and retrieving documents |
| GPSoverIP | Protocol for transmitting GPS data over IP networks |
G Table
| Standard | Description |
|---|
| H.248 | Protocol for controlling media gateways |
H Table
| Standard | Description |
|---|
| ICalendar | Format for exchanging calendar data |
| ICMP Router Discovery Protocol | Protocol for discovering routers on a network |
| IETF Administrative Support Activity | Activity supporting administrative functions of IETF |
| Integrated services | QoS model for providing real-time services |
| Internationalized Resource Identifier | URI scheme supporting international characters |
| Internet Control Message Protocol | Protocol for sending control messages in IP networks |
| Internet Draft | Working document of the IETF |
| Internet Experiment Note | Document describing an experiment or research |
| Internet Group Management Protocol | Protocol for managing multicast group membership |
| Internet Group Management Protocol with Access Control | Protocol for managing multicast group membership with access control |
| Internet Protocol version 4 | Version 4 of the Internet Protocol |
| Internet resource locator | Locator for resources on the internet |
| Internet Society | Organization promoting the development and use of the internet |
| Internet Society Nepal | Chapter of the Internet Society in Nepal |
| IS-IS | Routing protocol for exchanging information between routers |
I Table
| Standard | Description |
|---|
| JSON Web Encryption | Format for encrypting and decrypting JSON data |
| JSON Web Signature | Format for representing digital signatures in JSON |
| Jughead (search engine) | Early search engine for locating Gopher resources |
J Table
| Standard | Description |
|---|
| Layer 2 Tunneling Protocol | Protocol for tunneling network traffic over IP |
| Lightweight Directory Access Protocol | Protocol for accessing and managing directory information |
| LDAP Data Interchange Format | Format for exchanging directory data in LDAP |
| Link Control Protocol | Protocol for establishing and terminating data link connections |
| Link layer | OSI layer responsible for physical network communication |
| LISTSERV | Mailing list management software |
L Table
| Standard | Description |
|---|
| M3UA | Protocol for signaling between IP networks and SS7 networks |
| MAC-Forced Forwarding | Technique for forwarding traffic based on MAC addresses |
| Media gateway control protocol architecture | Architecture for controlling media gateways |
| MIME Object Security Services | Services for securing MIME objects |
| MIMIC Simulator | Network simulation tool for testing network devices |
| Miracast | Wireless display standard for mirroring screens |
| Mobile web | Web browsing on mobile devices |
| MPLS-TP | Transport profile for Multiprotocol Label Switching |
| Multicast Listener Discovery | Protocol for discovering multicast listeners |
| Multiprotocol Encapsulation over ATM | Encapsulation method for transmitting multiple protocols over ATM |
| Multiprotocol Label Switching | Protocol for forwarding packets based on labels |
M Table
| Standard | Description |
|---|
| National Internet registry | Organization responsible for allocating IP addresses |
| Neighbor Discovery Protocol | Protocol for discovering and configuring neighboring devices |
| Nepal IGF | Internet Governance Forum in Nepal |
| Net-SNMP | Suite of SNMP tools and libraries |
| NETCONF | Protocol for network configuration |
| Network Access Identifier | Identifier used for network access authentication |
| Network Data Representation | Data representation format used in network communication |
| Network News Transfer Protocol | Protocol for retrieving and posting Usenet articles |
| Network Security Services | Set of security libraries and tools |
| Network Time Protocol | Protocol for synchronizing clocks over a network |
| Bounce message | Error message indicating non-delivery of an email |
N Table
| Standard | Description |
|---|
| OCSP stapling | Method for checking the revocation status of an SSL/TLS certificate |
| OFTP | Protocol for secure file transfer |
| Online Certificate Status Protocol | Protocol for checking the revocation status of digital certificates |
| Open Shortest Path First | Routing protocol for interior gateway networks |
O Table
| Standard | Description |
|---|
| Point-to-Point Protocol | Protocol for establishing point-to-point connections |
| Poly1305 | Message authentication code used in cryptographic protocols |
| Pool Element | Component used in managing resource pools |
| Pool Registrar | Entity responsible for managing resource pools |
| Pool User | Entity utilizing resources from a resource pool |
| Portmap | Service that maps remote procedure call programs to ports |
| Proxy ARP | Technique for proxying Address Resolution Protocol |
P Table
| Standard | Description |
|---|
| RADIUS | Protocol for authentication, authorization, and accounting |
| Rdate | Protocol for setting the system clock over a network |
| Regional Internet registry | Organization responsible for allocating IP addresses |
| Registration Data Access Protocol | Protocol for accessing registration data of domain names |
| Reliable Event Logging Protocol | Protocol for reliable logging of events |
| Reliable Server Pooling | Technique for load balancing and high availability |
| Reverse Address Resolution Protocol | Protocol for mapping a MAC address to an IP address |
| List of RFCs | List of Request for Comments (RFC) documents |
| Robust Header Compression | Protocol for compressing IP and TCP headers |
| Robustness principle | Design principle stating that software should handle errors gracefully |
| Route poisoning | Technique for indicating an unreachable network route |
| Route server | Server that distributes routing information to routers |
| Router alert label | Label used in IP packets to indicate special handling |
| Routing Assets Database | Database containing information about networkI apologize for the repeated cutoffs. Here’s the continuation of the table: |
| Routing Assets Database | Database containing information about network assets |
| Routing Information Protocol | Distance-vector routing protocol for IP networks |
| Rsyslog | System logging protocol and software |
| Rtelnet | Remote terminal emulation protocol |
R Table
| Standard | Description |
|---|
| Salsa20 | Stream cipher algorithm |
| SCTP packet structure | Structure of packets used in Stream Control Transmission Protocol |
| SCVP | Protocol for cryptographic validation of certificates |
| SDXF | Data exchange format for sensor data |
| Sensor Web Enablement | Framework for interoperable use of sensor networks |
| Service Location Protocol | Protocol for service discovery and configuration |
| Session Announcement Protocol | Protocol for announcing multimedia sessions |
| Session Description Protocol | Format for describing multimedia sessions |
| Shared Whois Project | Collaboration project for sharing Whois data |
| Shibboleth (software) | Single sign-on and identity federation software |
| Simple Authentication and Security Layer | Framework for authentication and data security |
| Simple Certificate Enrollment Protocol | Protocol for requesting and managing digital certificates |
| Simple Network Management Protocol | Protocol for managing and monitoring network devices |
| Split horizon route advertisement | Technique for preventing routing loops |
| SSHFP record | DNS record for storing SSH fingerprints |
| STD 8 | Specification for the File Transfer Protocol |
| Stream Control Transmission Protocol | Transport protocol providing reliable and ordered delivery |
| Sun RPC | Remote Procedure Call mechanism developed by Sun Microsystems |
| Syslog | Protocol for forwarding log messages over a network |
| Syslog-ng | Enhanced version of the syslog protocol |
S Table
| Standard | Description |
|---|
| T/TCP | TCP extension for fast connection setup and termination |
| T-MPLS | Transport MPLS, a variant of Multiprotocol Label Switching |
| T.37 | ITU-T standard for store and forward fax messaging |
| T.38 | ITU-T standard for real-time fax over IP networks |
| Tag URI scheme | URI scheme for identifying resources using tags |
| TCP-Illinois | Congestion control algorithm for TCP |
| Telnet | Protocol for remote terminal emulation |
| Token Binding | Security mechanism for binding tokens to cryptographic keys |
| Tor (network) | Network for anonymous communication |
| TR-069 | Protocol for remote management of devices |
| TSIG | Transaction Signature, a mechanism for authenticated DNS transactions |
| TXT record | DNS record for storing arbitrary text |
| Type–length–value | Encoding scheme for structured data |
T Table
| Standard | Description |
|---|
| UDP Helper Address | Configuration parameter used in DHCP snooping |
| Uniform Resource Identifier | String of characters used to identify resources |
| Universal 2nd Factor | Authentication method using physical tokens |
| URI Template | Specification for URI patterns |
| URL encoding | Encoding method for representing special characters in URLs |
| Usenet | Worldwide distributed discussion system |
| User Datagram Protocol | Transport protocol providing connectionless communication |
U Table
| Standard | Description |
|---|
| VCard | Electronic business card format |
| Veronica (search engine) | Search engine for Gopher menus and documents |
| Virtual circuit multiplexing | TechniqueI apologize once again for the repeated cutoff. Here’s the continuation of the table: |
| Virtual circuit multiplexing | Technique for multiplexing multiple virtual circuits |
| VPIM | Voice Profile for Internet Mail, standard for voice messaging integration with email |
V Table
| Standard | Description |
|---|
| Web Proxy Auto-Discovery Protocol | Protocol for automatic proxy configuration in web browsers |
| WHOIS | Protocol for querying domain registration information |
| WHOIS++ | Enhanced version of the WHOIS protocol |
| Wide area information server | Protocol for searching and retrieving information |
| Wireless Transport Layer Security | Protocol for securing wireless communications |
W Table
| Standard | Description |
|---|
| X.1035 | ITU-T standard for service definition |
| Xpress Transport Protocol | Transport protocol optimized for high-performance networks |
X Table
Category. In Wikipedia. https://en.wikipedia.org/wiki/Category:Internet_Standards