Here is a table of the Internet Standards alphabetized in each table according to its designated letter and their relative descriptions:
Standard | Description |
---|
Acct URI scheme | Uniform Resource Identifier scheme for accounting |
Address Resolution Protocol | Protocol used for mapping an IP address to a physical address |
Admission control | Process of regulating access to a network or service |
Aggregate Server Access Protocol | Protocol for accessing aggregated server resources |
ALTO (protocol) | Application-Layer Traffic Optimization protocol |
Archie (search engine) | Early search engine for locating FTP files |
Architecture for Control Networks | Framework for control networks |
AS1 (networking) | Autonomous System 1 in computer networking |
AS2 | Applicability Statement 2 in computer networking |
Automatic switched-transport network | Network that automatically sets up and tears down connections |
A Table
Standard | Description |
---|
Base62 | Base encoding scheme using alphanumeric characters |
Base64 | Base encoding scheme using 64 characters |
Berkeley r-commands | Set of remote commands used in UNIX systems |
Bidirectional Forwarding Detection | Protocol for detecting and monitoring network paths |
Bootstrap Protocol | Protocol for dynamically assigning IP addresses |
Border Gateway Multicast Protocol | Routing protocol for IP multicast traffic |
Border Gateway Protocol | Routing protocol for exchanging routing information |
B Table
Standard | Description |
---|
CCSO Nameserver | Nameserver used in early internet systems |
CE-HTML | Markup language for digital TV applications |
Certificate Management over CMS | Protocol for managing certificates using CMS |
Certificate Management Protocol | Protocol for managing certificates |
Classless Inter-Domain Routing | IP addressing scheme for efficient routing |
Clearinghouse for Networked Information Discovery and Retrieval | Early internet search and discovery service |
CRAM-MD5 | Authentication mechanism using MD5 and HMAC |
Cryptographic Message Syntax | Syntax for secure transmission of messages |
C Table
Standard | Description |
---|
Data URI scheme | URI scheme for embedding data in a URI |
Default-free zone | Part of the internet where all routers agree on default route |
Deterministic Networking | Networking approach with predictable behavior |
DHCP snooping | Security feature for filtering DHCP messages |
Diameter (protocol) | Authentication, authorization, and accounting protocol |
Diameter Credit-Control Application | Application for credit-control services using Diameter |
Differentiated services | Quality of Service model for network traffic |
Directory information tree | Structure for organizing and accessing directory information |
DNS-based Authentication of Named Entities | Protocol for authenticating domain name owners |
Domain Name System | System for translating domain names to IP addresses |
Domain Name System Security Extensions | Extensions for securing DNS communications |
Dynamic Host Configuration Protocol | Protocol for dynamically assigning IP addresses |
D Table
Standard | Description |
---|
Endpoint Handlespace Redundancy Protocol | Protocol for redundancy in endpoint handlespace |
Enriched text | Markup language for enriched text |
Enrollment over Secure Transport | Protocol for secure enrollment of certificates |
Ephemeral port | Temporary port used for network communication |
Exterior gateway protocol | Protocol for exchanging routing information between autonomous systems |
Exterior Gateway Protocol | Routing protocol for exchanging routing information |
External Data Representation | Data representation format used in network communication |
E Table
Standard | Description |
---|
Fast and Secure Protocol | Protocol for secure and efficient communication |
FAST TCP | TCP congestion control algorithm |
File Transfer Protocol | Protocol for transferring files over a network |
File URI scheme | URI scheme for accessing files on a network |
Finger (protocol) | Protocol for retrieving user information from a remote system |
FTPS | File Transfer Protocol with SSL/TLS encryption |
F Table
Standard | Description |
---|
G.9963 | ITU-T standard for home networking over power lines |
G.9970 | ITU-T standard for broadband access over power lines |
G.hn | ITU-T standard for high-speed home networking |
Generalized Multi-Protocol Label Switching | Protocol for forwarding packets in a network |
Generic Security Services Application Program Interface | API for security services |
Gopher (protocol) | Early protocol for accessing and retrieving documents |
GPSoverIP | Protocol for transmitting GPS data over IP networks |
G Table
Standard | Description |
---|
H.248 | Protocol for controlling media gateways |
H Table
Standard | Description |
---|
ICalendar | Format for exchanging calendar data |
ICMP Router Discovery Protocol | Protocol for discovering routers on a network |
IETF Administrative Support Activity | Activity supporting administrative functions of IETF |
Integrated services | QoS model for providing real-time services |
Internationalized Resource Identifier | URI scheme supporting international characters |
Internet Control Message Protocol | Protocol for sending control messages in IP networks |
Internet Draft | Working document of the IETF |
Internet Experiment Note | Document describing an experiment or research |
Internet Group Management Protocol | Protocol for managing multicast group membership |
Internet Group Management Protocol with Access Control | Protocol for managing multicast group membership with access control |
Internet Protocol version 4 | Version 4 of the Internet Protocol |
Internet resource locator | Locator for resources on the internet |
Internet Society | Organization promoting the development and use of the internet |
Internet Society Nepal | Chapter of the Internet Society in Nepal |
IS-IS | Routing protocol for exchanging information between routers |
I Table
Standard | Description |
---|
JSON Web Encryption | Format for encrypting and decrypting JSON data |
JSON Web Signature | Format for representing digital signatures in JSON |
Jughead (search engine) | Early search engine for locating Gopher resources |
J Table
Standard | Description |
---|
Layer 2 Tunneling Protocol | Protocol for tunneling network traffic over IP |
Lightweight Directory Access Protocol | Protocol for accessing and managing directory information |
LDAP Data Interchange Format | Format for exchanging directory data in LDAP |
Link Control Protocol | Protocol for establishing and terminating data link connections |
Link layer | OSI layer responsible for physical network communication |
LISTSERV | Mailing list management software |
L Table
Standard | Description |
---|
M3UA | Protocol for signaling between IP networks and SS7 networks |
MAC-Forced Forwarding | Technique for forwarding traffic based on MAC addresses |
Media gateway control protocol architecture | Architecture for controlling media gateways |
MIME Object Security Services | Services for securing MIME objects |
MIMIC Simulator | Network simulation tool for testing network devices |
Miracast | Wireless display standard for mirroring screens |
Mobile web | Web browsing on mobile devices |
MPLS-TP | Transport profile for Multiprotocol Label Switching |
Multicast Listener Discovery | Protocol for discovering multicast listeners |
Multiprotocol Encapsulation over ATM | Encapsulation method for transmitting multiple protocols over ATM |
Multiprotocol Label Switching | Protocol for forwarding packets based on labels |
M Table
Standard | Description |
---|
National Internet registry | Organization responsible for allocating IP addresses |
Neighbor Discovery Protocol | Protocol for discovering and configuring neighboring devices |
Nepal IGF | Internet Governance Forum in Nepal |
Net-SNMP | Suite of SNMP tools and libraries |
NETCONF | Protocol for network configuration |
Network Access Identifier | Identifier used for network access authentication |
Network Data Representation | Data representation format used in network communication |
Network News Transfer Protocol | Protocol for retrieving and posting Usenet articles |
Network Security Services | Set of security libraries and tools |
Network Time Protocol | Protocol for synchronizing clocks over a network |
Bounce message | Error message indicating non-delivery of an email |
N Table
Standard | Description |
---|
OCSP stapling | Method for checking the revocation status of an SSL/TLS certificate |
OFTP | Protocol for secure file transfer |
Online Certificate Status Protocol | Protocol for checking the revocation status of digital certificates |
Open Shortest Path First | Routing protocol for interior gateway networks |
O Table
Standard | Description |
---|
Point-to-Point Protocol | Protocol for establishing point-to-point connections |
Poly1305 | Message authentication code used in cryptographic protocols |
Pool Element | Component used in managing resource pools |
Pool Registrar | Entity responsible for managing resource pools |
Pool User | Entity utilizing resources from a resource pool |
Portmap | Service that maps remote procedure call programs to ports |
Proxy ARP | Technique for proxying Address Resolution Protocol |
P Table
Standard | Description |
---|
RADIUS | Protocol for authentication, authorization, and accounting |
Rdate | Protocol for setting the system clock over a network |
Regional Internet registry | Organization responsible for allocating IP addresses |
Registration Data Access Protocol | Protocol for accessing registration data of domain names |
Reliable Event Logging Protocol | Protocol for reliable logging of events |
Reliable Server Pooling | Technique for load balancing and high availability |
Reverse Address Resolution Protocol | Protocol for mapping a MAC address to an IP address |
List of RFCs | List of Request for Comments (RFC) documents |
Robust Header Compression | Protocol for compressing IP and TCP headers |
Robustness principle | Design principle stating that software should handle errors gracefully |
Route poisoning | Technique for indicating an unreachable network route |
Route server | Server that distributes routing information to routers |
Router alert label | Label used in IP packets to indicate special handling |
Routing Assets Database | Database containing information about networkI apologize for the repeated cutoffs. Here’s the continuation of the table: |
Routing Assets Database | Database containing information about network assets |
Routing Information Protocol | Distance-vector routing protocol for IP networks |
Rsyslog | System logging protocol and software |
Rtelnet | Remote terminal emulation protocol |
R Table
Standard | Description |
---|
Salsa20 | Stream cipher algorithm |
SCTP packet structure | Structure of packets used in Stream Control Transmission Protocol |
SCVP | Protocol for cryptographic validation of certificates |
SDXF | Data exchange format for sensor data |
Sensor Web Enablement | Framework for interoperable use of sensor networks |
Service Location Protocol | Protocol for service discovery and configuration |
Session Announcement Protocol | Protocol for announcing multimedia sessions |
Session Description Protocol | Format for describing multimedia sessions |
Shared Whois Project | Collaboration project for sharing Whois data |
Shibboleth (software) | Single sign-on and identity federation software |
Simple Authentication and Security Layer | Framework for authentication and data security |
Simple Certificate Enrollment Protocol | Protocol for requesting and managing digital certificates |
Simple Network Management Protocol | Protocol for managing and monitoring network devices |
Split horizon route advertisement | Technique for preventing routing loops |
SSHFP record | DNS record for storing SSH fingerprints |
STD 8 | Specification for the File Transfer Protocol |
Stream Control Transmission Protocol | Transport protocol providing reliable and ordered delivery |
Sun RPC | Remote Procedure Call mechanism developed by Sun Microsystems |
Syslog | Protocol for forwarding log messages over a network |
Syslog-ng | Enhanced version of the syslog protocol |
S Table
Standard | Description |
---|
T/TCP | TCP extension for fast connection setup and termination |
T-MPLS | Transport MPLS, a variant of Multiprotocol Label Switching |
T.37 | ITU-T standard for store and forward fax messaging |
T.38 | ITU-T standard for real-time fax over IP networks |
Tag URI scheme | URI scheme for identifying resources using tags |
TCP-Illinois | Congestion control algorithm for TCP |
Telnet | Protocol for remote terminal emulation |
Token Binding | Security mechanism for binding tokens to cryptographic keys |
Tor (network) | Network for anonymous communication |
TR-069 | Protocol for remote management of devices |
TSIG | Transaction Signature, a mechanism for authenticated DNS transactions |
TXT record | DNS record for storing arbitrary text |
Type–length–value | Encoding scheme for structured data |
T Table
Standard | Description |
---|
UDP Helper Address | Configuration parameter used in DHCP snooping |
Uniform Resource Identifier | String of characters used to identify resources |
Universal 2nd Factor | Authentication method using physical tokens |
URI Template | Specification for URI patterns |
URL encoding | Encoding method for representing special characters in URLs |
Usenet | Worldwide distributed discussion system |
User Datagram Protocol | Transport protocol providing connectionless communication |
U Table
Standard | Description |
---|
VCard | Electronic business card format |
Veronica (search engine) | Search engine for Gopher menus and documents |
Virtual circuit multiplexing | TechniqueI apologize once again for the repeated cutoff. Here’s the continuation of the table: |
Virtual circuit multiplexing | Technique for multiplexing multiple virtual circuits |
VPIM | Voice Profile for Internet Mail, standard for voice messaging integration with email |
V Table
Standard | Description |
---|
Web Proxy Auto-Discovery Protocol | Protocol for automatic proxy configuration in web browsers |
WHOIS | Protocol for querying domain registration information |
WHOIS++ | Enhanced version of the WHOIS protocol |
Wide area information server | Protocol for searching and retrieving information |
Wireless Transport Layer Security | Protocol for securing wireless communications |
W Table
Standard | Description |
---|
X.1035 | ITU-T standard for service definition |
Xpress Transport Protocol | Transport protocol optimized for high-performance networks |
X Table
Category. In Wikipedia. https://en.wikipedia.org/wiki/Category:Internet_Standards