User Tools

Site Tools


abbrev_list

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
abbrev_list [2025/06/20 21:00] kcmabbrev_list [2026/02/12 05:44] (current) – external edit 127.0.0.1
Line 7: Line 7:
 title, in an abstract, or in the body of the document. title, in an abstract, or in the body of the document.
  
-The RFC Editor attempts to keep the use of abbreviations consistent and+The RFC Production Center attempts to keep the use of abbreviations consistent and
 to point out conflicts to authors.  For this purpose, we have built the to point out conflicts to authors.  For this purpose, we have built the
 abbreviation list below.  This list contains abbreviations appearing in abbreviation list below.  This list contains abbreviations appearing in
Line 14: Line 14:
 have multiple expansions. have multiple expansions.
  
-Some abbreviations are so well known that expansion is probably +Some abbreviations are so well known that expansion is probably unnecessary. The RPC determines whether to mark an abbreviation as "well known" by considering the following: 
-unnecessary.  The RFC Editor exercises editorial judgment about whether +  (Fairly) consistent use in RFCs 
-a particular use of one of the "well-known" abbreviations requires +  * Unique (no multiple expansions for the same abbreviation) 
-expansion.  (For example, strict adherence to the expansion requirement +  * Been around for more than a decade 
-can lead to impossibly ugly titles.)  In the following list of +  * Expected to remain well known in the future 
-abbreviationsthose that are usually (but not necessarily) treated as +  * Easily found via general web search 
-"well knownare marked with asterisks.  However, since there are so +  * Commonly used in the world at large (e.gHTML) 
-many different abbreviations and there is a range of knowledge among +  * Known more commonly by the abbreviation than the expanded form (e.g.QR code) 
-RFC readers, we tend to expand abbreviations in case of doubt.+  * Can be found in the Merriam-Webster dictionary 
 +An asterisk (*) in the abbreviation's row indicates that the abbreviation is usually (but not necessarily) treated as well known”. Abbreviations that are very common outside of the RFC series might not be listed in the table.  Because there are so many different abbreviations and there is a range of knowledge among RFC readers, the RPC exercises editorial judgment about whether a particular use of one of the "well-known" abbreviations requires expansion. We tend to expand abbreviations in case of doubt.
  
 Finally, this list includes some terms that look like abbreviations Finally, this list includes some terms that look like abbreviations
Line 134: Line 135:
 | AHS      |   | Additional Header Segment (AHS)   | | | AHS      |   | Additional Header Segment (AHS)   | |
 | :::      |   | Adaptive HTTP Streaming (AHS)   | | | :::      |   | Adaptive HTTP Streaming (AHS)   | |
 +| AI       | * | Artificial Intelligence (AI)    | |
 | AIA      |   | Authority Information Access (AIA)  | | | AIA      |   | Authority Information Access (AIA)  | |
 | AIMD       | Additive Increase Multiplicative Decrease (AIMD)  | | | AIMD       | Additive Increase Multiplicative Decrease (AIMD)  | |
Line 252: Line 254:
 | BB         | Bottleneck Bandwidth (BB)   | | | BB         | Bottleneck Bandwidth (BB)   | |
 | BBF      |   | Broadband Forum (BBF)   | | | BBF      |   | Broadband Forum (BBF)   | |
 +| BBR      |   | Bottleneck Bandwidth and Round-trip propagation time (BBR)  | |
 | BC         | Boundary Clock (BC)   | | | BC         | Boundary Clock (BC)   | |
 | BCB      |   | Backbone Core Bridge (BCB)   | | | BCB      |   | Backbone Core Bridge (BCB)   | |
Line 282: Line 285:
 | BFR      |   | Bit-Forwarding Router (BFR)   | | | BFR      |   | Bit-Forwarding Router (BFR)   | |
 | BGP      | * | Border Gateway Protocol  | | | BGP      | * | Border Gateway Protocol  | |
-| BGP ORR  |   | BGP Optimal Route Reflection (BGP ORR)  |  | +| BGP ORR  |   | BGP Optimal Route Reflection (BGP ORR)  |  |
 | BGP-LS     | Border Gateway Protocol - Link State  | | | BGP-LS     | Border Gateway Protocol - Link State  | |
 | BGPsec     | Typically not expanded  | | | BGPsec     | Typically not expanded  | |
Line 357: Line 360:
 | C2        |   | Command and Control (C2)   | | | C2        |   | Command and Control (C2)   | |
 | C2P         | customer-to-provider (C2P)   | | | C2P         | customer-to-provider (C2P)   | |
-| CA        |   | certification authority (CA)   preferred expansion  |+| CA        |   | certification authority (CA)   | |
 | :::         | certificate authority (CA)   | | | :::         | certificate authority (CA)   | |
 | :::         | cryptographic authentication (CA)   | | | :::         | cryptographic authentication (CA)   | |
Line 520: Line 523:
 | CO           | Central Office (CO)   | | | CO           | Central Office (CO)   | |
 | :::        |   | Connection Only (CO)   | | | :::        |   | Connection Only (CO)   | |
 +| CoDel      |   | Controlled Delay (CoDel)  | |
 +| CoJP         | Constrained Join Protocol (CoJP)  | |
 | COM        |   | Component Object Module (COM)   | | | COM        |   | Component Object Module (COM)   | |
 | COMEDIA    |   | Connection-Oriented Media (COMEDIA)   | | | COMEDIA    |   | Connection-Oriented Media (COMEDIA)   | |
Line 604: Line 609:
 | :::        |   | Current Transformer (CT)  | | | :::        |   | Current Transformer (CT)  | |
 | CT_IU      |   | Common Transport Information Unit (CT_IU)  | | | CT_IU      |   | Common Transport Information Unit (CT_IU)  | |
 +| CTAP         | Client to Authenticator Protocol (CTAP)   | |
 | CTO        |   | Congestion Timeout (CTO)   | | | CTO        |   | Congestion Timeout (CTO)   | |
 | CTM        |   | Cellular Text Telephone Modem (CTM)   | | | CTM        |   | Cellular Text Telephone Modem (CTM)   | |
Line 618: Line 624:
 | cwnd         | congestion window (cwnd)   | | | cwnd         | congestion window (cwnd)   | |
 | CWR        |   | Do not expand   |TCP flag bit name| | CWR        |   | Do not expand   |TCP flag bit name|
-| CWT        |   | CBOR Web Token (CWT) +| CWT        |   | CBOR Web Token (CWT)  | |
 | d-CW         | DetNet Control Word (d-CW)  | | | d-CW         | DetNet Control Word (d-CW)  | |
 | DA           | Destination Address (DA)   | | | DA           | Destination Address (DA)   | |
Line 673: Line 679:
 | DER        | * | Distinguished Encoding Rules   | | | DER        | * | Distinguished Encoding Rules   | |
 | DES        | * | Data Encryption Standard (DES)  | | | DES        | * | Data Encryption Standard (DES)  | |
 +| DET        |   | DRIP Entity Tag (DET) | | 
 | DetNet       | Deterministic Networking (DetNet)  | | | DetNet       | Deterministic Networking (DetNet)  | |
 | DF           | Don't Fragment (DF)   | | | DF           | Don't Fragment (DF)   | |
Line 690: Line 697:
 | :::        |   | decentralized identifier (DID)    | | | :::        |   | decentralized identifier (DID)    | |
 | DIFS         | Distributed Interframe Space (DIFS)   | | | DIFS         | Distributed Interframe Space (DIFS)   | |
 +| DIME         | DRIP Identity Management Entity (DIME) | | 
 | DIO        |   | DODAG Information Object (DIO)   | | | DIO        |   | DODAG Information Object (DIO)   | |
 | DIS        |   | DODAG Information Solicitation (DIS)  | | | DIS        |   | DODAG Information Solicitation (DIS)  | |
Line 696: Line 704:
 | DKIM         | DomainKeys Identified Mail (DKIM)   | | | DKIM         | DomainKeys Identified Mail (DKIM)   | |
 | DLC        |   | Data Link Control (DLC)  |  | | DLC        |   | Data Link Control (DLC)  |  |
-| DLCI      |   | Data Link Connection Identifier (DLCI) +| DLCI      |   | Data Link Connection Identifier (DLCI)  
-| DLEP      |   | Dynamic Link Exchange Protocol (DLEP)   |+| DLEP      |   | Dynamic Link Exchange Protocol (DLEP)   |
 | DLP         | Discrete Logarithm Problem (DLP)  | | | DLP         | Discrete Logarithm Problem (DLP)  | |
 | :::         | Data Loss Prevention (DLP)   | | | :::         | Data Loss Prevention (DLP)   | |
Line 810: Line 818:
 | DUT         | Device Under Test (DUT)   | | | DUT         | Device Under Test (DUT)   | |
 | DVB         | Digital Video Broadcasting (DVB)    | | | DVB         | Digital Video Broadcasting (DVB)    | |
-| DVB-H       | Digital Video Broadcasting - Handheld (DVB-H)   | | +| DVB-H       | Digital Video Broadcasting - Handheld (DVB-H)   | |
 | DVB-IPDC  |   | Digital Video Broadcasting - Internet Protocol Datacast (DBC-IPDC)   | | | DVB-IPDC  |   | Digital Video Broadcasting - Internet Protocol Datacast (DBC-IPDC)   | |
 | DVI       | * | No expansion   | | | DVI       | * | No expansion   | |
Line 833: Line 841:
 | EAP-AKA     | EAP Authentication and Key Agreement (EAP-AKA)   | | | EAP-AKA     | EAP Authentication and Key Agreement (EAP-AKA)   | |
 | EAP-GSPK  |   | Extensible Authentication Protocol - Generalized Pre-Shared Key (EAP-GPSK)    | | | EAP-GSPK  |   | Extensible Authentication Protocol - Generalized Pre-Shared Key (EAP-GPSK)    | |
 +| EAP-NOOB  |   | Nimble Out-of-Band Authentication for EAP (EAP-NOOB)   | |
 | EAP-SIM     | EAP Subscriber Identity Module (EAP-SIM)   | | | EAP-SIM     | EAP Subscriber Identity Module (EAP-SIM)   | |
 | EAP-TTLS  |   | Extensible Authentication Protocol Tunneled Transport Layer Security (EAP-TTLS)    | | | EAP-TTLS  |   | Extensible Authentication Protocol Tunneled Transport Layer Security (EAP-TTLS)    | |
Line 918: Line 927:
 | EOF       | * | End of File (EOF)   | | | EOF       | * | End of File (EOF)   | |
 | EOF         | Extended Options and Flags (EOF)    | | | EOF         | Extended Options and Flags (EOF)    | |
 +| EOL         | End of Options List (EOL) | |
 | EoR         | End-of-Row (EoR)    | | | EoR         | End-of-Row (EoR)    | |
-| EOR       | * | exclusive or  | In logical operations, the exclusive disjunction, also called exclusive or, (symbolized XOR or EOR), is a type of logical disjunction on two operands that results in a value of "true" if and only if exactly one of the operands has a value of "true."  (Wikipedia)  +| :::         | End-of-RIB (EoR)    | | 
-| :::         | End of Rib (EoR)    | |+| EOR       | * | exclusive or  | In logical operations, the exclusive disjunction, also called exclusive or, (symbolized XOR or EOR), is a type of logical disjunction on two operands that results in a value of "true" if and only if exactly one of the operands has a value of "true."  (Wikipedia)  | |
 | EPA         | Explicit Path Attribute (EPA)   | | | EPA         | Explicit Path Attribute (EPA)   | |
 | EPC         | Electronic Product Code (EPC)    | | | EPC         | Electronic Product Code (EPC)    | |
Line 991: Line 1001:
 | FA        |   | forwarding adjacency (FA)   | | | FA        |   | forwarding adjacency (FA)   | |
 | :::         | Foreign Agent (FA)   | | | :::         | Foreign Agent (FA)   | |
 +| FACK      |   | Forward Acknowledgement   | |
 | FAD         | feature and attribute data (FAD)    | | | FAD         | feature and attribute data (FAD)    | |
 +| :::         | Flexible Algorithm Definition (FAD) | |
 | FAN ELS     | Fabric Address Notification Extended Link Service (FAN ELS)  | Pronounced "fan ee el es" | | FAN ELS     | Fabric Address Notification Extended Link Service (FAN ELS)  | Pronounced "fan ee el es" |
 | FARP      |   | Fibre Channel Address Resolution Protocol (FARP)  | Pronounced "farp" | | FARP      |   | Fibre Channel Address Resolution Protocol (FARP)  | Pronounced "farp" |
Line 1149: Line 1161:
 |HAC       | | Home Agent Controller (HAC)   | | |HAC       | | Home Agent Controller (HAC)   | |
 |HAS       | | HTTP Adaptive Streaming (HAS)   | | |HAS       | | HTTP Adaptive Streaming (HAS)   | |
 +|HATEOAS   | | Hypermedia as the Engine of Application State (HATEOAS)   | |
 |HBA       | | Host Bus Adapter (HBA)   | | |HBA       | | Host Bus Adapter (HBA)   | |
 |:::       | | Host-Based Authentication (HBA)   | | |:::       | | Host-Based Authentication (HBA)   | |
Line 1280: Line 1293:
 |IIH       | | IS-IS Hello (IIH)   | | |IIH       | | IS-IS Hello (IIH)   | |
 |IIR       | | infinite impulse response (IIR)   | | |IIR       | | infinite impulse response (IIR)   | |
-|IKE       | | Internet Key Exchange Protocol (IKE)  | +|IKE       | | Internet Key Exchange Protocol (IKE)  | "Protocol" should be used in the expansion |
-|:::       | | Internet Key Exchange (IKE)           |+
 |IKEv2     | | Internet Key Exchange Protocol Version 2 (IKEv2)  | | |IKEv2     | | Internet Key Exchange Protocol Version 2 (IKEv2)  | |
 |IKM       | | input keying material (IKM)  | | |IKM       | | input keying material (IKM)  | |
Line 1323: Line 1335:
 |IPBX      | | IP Private Branch Exchange (IPBX)  | | |IPBX      | | IP Private Branch Exchange (IPBX)  | |
 |IPEI     | | International Portable Equipment Identity (IPEI)   | | |IPEI     | | International Portable Equipment Identity (IPEI)   | |
 +|IPComp    | | IP Payload Compression (IPComp) | |
 |IPCP      | | IP Control Protocol (IPCP)  | | |IPCP      | | IP Control Protocol (IPCP)  | |
 |IPDV      | | Inter-Packet Delay Variation (IPDV)   | | |IPDV      | | Inter-Packet Delay Variation (IPDV)   | |
Line 1462: Line 1475:
 |L3SM      | | L3VPN Service Model (L3SM)  | | |L3SM      | | L3VPN Service Model (L3SM)  | |
 |L3VPN     |*|Layer 3 Virtual Private Network (L3VPN)  | | |L3VPN     |*|Layer 3 Virtual Private Network (L3VPN)  | |
 +|L4S       | | Low Latency, Low Loss, and Scalable Throughput (L4S)  | |
 |L-LSP     | | Label-Only-Inferred-PSC LSP (L-LSP)  | | |L-LSP     | | Label-Only-Inferred-PSC LSP (L-LSP)  | |
 |LAALP     | | Local Active-Active Link Protocol (LAALP)   | | |LAALP     | | Local Active-Active Link Protocol (LAALP)   | |
Line 1622: Line 1636:
 |MA-L      | | MAC Address Block Large    | | |MA-L      | | MAC Address Block Large    | |
 |MA/RA     | | Maintenance Agency/Registration Authority (MA/RA)  | | |MA/RA     | | Maintenance Agency/Registration Authority (MA/RA)  | |
-|MAC       | | Media Access Control (MAC)  | Sublayer of the Link Layer; most frequently used in combination with "address". General guidance: When "MAC" appears in context with "address", it should be expanded in the IEEE sense. +|MAC       | | Media Access Control (MAC)  | Sublayer of the Link Layer; most frequently used in combination with "address". General guidance: When "MAC" appears in context with "address", it should be expanded in the IEEE sense. |
 |:::       | | Medium Access Control (MAC)   | Media/Medium dependent upon plural/singular. /* Per Dan Romascanu for RFCs 5412-5418. */  | |:::       | | Medium Access Control (MAC)   | Media/Medium dependent upon plural/singular. /* Per Dan Romascanu for RFCs 5412-5418. */  |
 |:::       | | Message Authentication Code (MAC)  | Legacy cryptographic terminology | |:::       | | Message Authentication Code (MAC)  | Legacy cryptographic terminology |
Line 1669: Line 1683:
 |MDS       | | Maximal Separable Distance (MDS)   | | |MDS       | | Maximal Separable Distance (MDS)   | |
 |:::       | | MetaData Server (MDS)   | | |:::       | | MetaData Server (MDS)   | |
 +|:::       | | Maximum Datagram Size (MDS)  | |
 |MDSC     | | Multi-Domain Service Coordinator (MDSC)  | | |MDSC     | | Multi-Domain Service Coordinator (MDSC)  | |
 |MDT       | | Multicast Distribution Tree (MDT)   | | |MDT       | | Multicast Distribution Tree (MDT)   | |
Line 1808: Line 1823:
 |MSISDN    | | Mobile Station International Subscriber Dial Number (MSISDN)   | | |MSISDN    | | Mobile Station International Subscriber Dial Number (MSISDN)   | |
 |:::       | | Mobile Subscriber Integrated Services Digital Network number (MSISDN)   | | |:::       | | Mobile Subscriber Integrated Services Digital Network number (MSISDN)   | |
 +|MSK       | | Master Session Key (MSK)  | |
 |MSL       | | maximum segment lifetime (MSL)  | | |MSL       | | maximum segment lifetime (MSL)  | |
 |MSM       | | Mobile Station Modem (MSM)   | | |MSM       | | Mobile Station Modem (MSM)   | |
Line 2133: Line 2149:
 | PCO          |   | Protocol Configuration Option (PCO)       | | PCO          |   | Protocol Configuration Option (PCO)       |
 | PCP          |   | Port Control Protocol (PCP)       | | PCP          |   | Port Control Protocol (PCP)       |
 +| :::          |   | Priority Code Point (PCP)       |
 | PCR          |   | Path Control and Reservation (PCR)       | | PCR          |   | Path Control and Reservation (PCR)       |
 | PCRE           | Perl Compatible Regular Expressions (PCRE)  |     | | PCRE           | Perl Compatible Regular Expressions (PCRE)  |     |
Line 2183: Line 2200:
 | :::          |   | Policy Identifier (PI)       | | :::          |   | Policy Identifier (PI)       |
 | PIB          |   | Payload Integrity Block (PIB)  |    | | PIB          |   | Payload Integrity Block (PIB)  |    |
 +| :::          |   | Policy Information Base (PIB)       |
 | PIC          |   | Prefix Independent Convergence (PIC) (commonly BCP PIC)  |    | | PIC          |   | Prefix Independent Convergence (PIC) (commonly BCP PIC)  |    |
 | PID          |   | Provider-defined Identifier (PID)      | | PID          |   | Provider-defined Identifier (PID)      |
Line 2200: Line 2218:
 | PITR           | Proxy Ingress Tunnel Router (PITR)      | | PITR           | Proxy Ingress Tunnel Router (PITR)      |
 | PK             | public key (PK)  | | | PK             | public key (PK)  | |
-| PKCE           | Proof Key for Code Exchange (PKCE)  | | +| PKCE           | Proof Key for Code Exchange (PKCE)  | |
 | PKCS         | * | Public-Key Cryptography Standards (PKCS) | Remove the expansion if it refers to series of standards, e.g., PKCS #8 | | PKCS         | * | Public-Key Cryptography Standards (PKCS) | Remove the expansion if it refers to series of standards, e.g., PKCS #8 |
 | PKG          |   | Private Key Generator (PKG)      | | PKG          |   | Private Key Generator (PKG)      |
Line 2265: Line 2283:
 | PPTP           | Point-to-Point Tunneling Protocol (PPTP)      | | PPTP           | Point-to-Point Tunneling Protocol (PPTP)      |
 | PQC          |   | post-quantum cryptosystem (PQC)     | | PQC          |   | post-quantum cryptosystem (PQC)     |
 +| :::          |   | Post-Quantum Cryptography (PQC)     |
 | PR             | Persistent Reservation (PR)      | | PR             | Persistent Reservation (PR)      |
 | PRID           | Push Resource ID (PRID)  |    | | PRID           | Push Resource ID (PRID)  |    |
Line 2285: Line 2304:
 | PRR          |   | Port-Range Router (PRR)      | | PRR          |   | Port-Range Router (PRR)      |
 | :::          |   | Policy Reserve Rule (PRR)      | | :::          |   | Policy Reserve Rule (PRR)      |
 +| :::          |   | Proportional Rate Reduction (PRR)      |
 | PRTC           | Primary Reference Time Clock (PRTC)  |    | | PRTC           | Primary Reference Time Clock (PRTC)  |    |
 | PS             | Parametric Stereo (PS)      | | PS             | Parametric Stereo (PS)      |
Line 2355: Line 2375:
 | RAA          |   | Re-Auth-Answer (RAA)  |    | | RAA          |   | Re-Auth-Answer (RAA)  |    |
 | RACK           | Recent Acknowledgment  |    | | RACK           | Recent Acknowledgment  |    |
-| RADIUS       | * | Remote Authentication Dial-In User Service (RADIUS)  | /* Year 2006+ docs don't expand RADIUS in title */  |+| RADIUS       | * | Remote Authentication Dial-In User Service (RADIUS) do not expand; more commonly known as RADIUS /* Year 2006+ docs don't expand RADIUS in title */  |
 | RAID           | Redundant Array of Independent Disks (RAID)  |    | | RAID           | Redundant Array of Independent Disks (RAID)  |    |
 | RAL          |   | RPL-Aware Leaf (RAL)  |    | | RAL          |   | RPL-Aware Leaf (RAL)  |    |
Line 2401: Line 2421:
 | RDNSS        |   | Recursive DNS Server (RDNSS)      | | RDNSS        |   | Recursive DNS Server (RDNSS)      |
 | RDO          |   | Route Discovery Option (RDO)      | | RDO          |   | Route Discovery Option (RDO)      |
 +| RDOS           | Reassembled Datagram Option Start (RDOS) | |
 | RDoT           | Recursive DoT (RDoT)    | | RDoT           | Recursive DoT (RDoT)    |
 | RDP          | * | Reliable Data Protocol (RDP)  |    | | RDP          | * | Reliable Data Protocol (RDP)  |    |
Line 2433: Line 2454:
 | RIB          | * | Routing Information Base (RIB)  |    | | RIB          | * | Routing Information Base (RIB)  |    |
 | RID          |   | Real-time Inter-network Defense (RID)    |    | | RID          |   | Real-time Inter-network Defense (RID)    |    |
 +| :::          |   | Remote Identification (RID) |    | 
 | :::          |   | restriction identifier (RID)  |    | | :::          |   | restriction identifier (RID)  |    |
 | RIG          |   | Referral Internet Groper (RIG)      | | RIG          |   | Referral Internet Groper (RIG)      |
Line 2446: Line 2468:
 | RLDRAM         | Reduced Latency Dynamic Random-Access Memory (RLDRAM)  | | | RLDRAM         | Reduced Latency Dynamic Random-Access Memory (RLDRAM)  | |
 | RLE          | * | Run Length Encoding      | | RLE          | * | Run Length Encoding      |
 +| RLFA           | Remote Loop-Free Alternate |  |
 +| rLEDBAT      |   | receiver-driven Low Extra Delay Background Transport (rLEDBAT)  | |
 | RLMI           | Resource List Meta-Information (RLMI)      | | RLMI           | Resource List Meta-Information (RLMI)      |
 | RLOC           | Routing Locator (RLOC)      | | RLOC           | Routing Locator (RLOC)      |
Line 2639: Line 2663:
 | SDH          |   | Synchronous Digital Hierarchy (SDH) |    | | SDH          |   | Synchronous Digital Hierarchy (SDH) |    |
 | SDID           | Signing Domain Identifier (SDID) |    | | SDID           | Signing Domain Identifier (SDID) |    |
 +| SD-JWT         | Selectively Disclosable JWT (SD-JWT) | 
 | SDK          | * | software development kit |    | | SDK          | * | software development kit |    |
 | SDN          |   | Software-Defined Networking (SDN) |    | | SDN          |   | Software-Defined Networking (SDN) |    |
Line 2686: Line 2711:
 | :::          |   | session ID (SID) | | | :::          |   | session ID (SID) | |
 | :::          |   | server ID (SID)  | | | :::          |   | server ID (SID)  | |
-| :::          |   | sender ID (SID)  | | +| :::          |   | sender ID (SID)  | |
 | :::          |   | Silence Descriptor (SID)  | Per guidance, "Silence Descriptor" or "Silence Insertion Description" The 3GPP and ETSI definition seems to be the former.  /* Ingemar Johansson (author) */  | | :::          |   | Silence Descriptor (SID)  | Per guidance, "Silence Descriptor" or "Silence Insertion Description" The 3GPP and ETSI definition seems to be the former.  /* Ingemar Johansson (author) */  |
 |:::             | Silence Insertion Descriptor (SID) | | |:::             | Silence Insertion Descriptor (SID) | |
Line 2772: Line 2797:
 | SP             | Service Provider (SP)  |    | | SP             | Service Provider (SP)  |    |
 | SPB          |   | Shortest Path Bridging (SPB)  |    | | SPB          |   | Shortest Path Bridging (SPB)  |    |
-| SPBM           | Shortest Path Bridging MAC mode (SPBM) (IEEE 802.1aq)+| SPBM           | Shortest Path Bridging MAC mode (SPBM) (IEEE 802.1aq)   |
 | SPC          |   | Service Provider Code (SPC)  |    | | SPC          |   | Service Provider Code (SPC)  |    |
 | :::          |   | Soft Permanent Connection (SPC) |    | | :::          |   | Soft Permanent Connection (SPC) |    |
Line 2821: Line 2846:
 | SRTT           | Smoothed Round-Trip Time (SRTT) |    | | SRTT           | Smoothed Round-Trip Time (SRTT) |    |
 | SRV          | * | Service Record (SRV) | Resource Record  | | SRV          | * | Service Record (SRV) | Resource Record  |
-| SRv6           | Segment Routing over IPv6 | +| SRv6           | Segment Routing over IPv6 (SRv6)
 | SS7          |   | Signaling System 7 (SS7)  |    | | SS7          |   | Signaling System 7 (SS7)  |    |
 | SS-FSSI      |   | Sender-Side FEC-Scheme-Specific Information (SS-FSSI)  |    | | SS-FSSI      |   | Sender-Side FEC-Scheme-Specific Information (SS-FSSI)  |    |
Line 2918: Line 2943:
 | TE           | * | Traffic Engineering (TE)  |    | | TE           | * | Traffic Engineering (TE)  |    |
 | :::          | * | Traffic Engineered (TE) |    | | :::          | * | Traffic Engineered (TE) |    |
 +| :::          |   | Teredo extension (TE) | |
 | TEAP           | Tunnel Extensible Authentication Protocol (TEAP)  |    | | TEAP           | Tunnel Extensible Authentication Protocol (TEAP)  |    |
 | TED          |   | Traffic Engineering Database (TED) |    | | TED          |   | Traffic Engineering Database (TED) |    |
Line 2941: Line 2967:
 | TIAS           | Transport Independent Application Specific (Maximum) (TIAS) |    | | TIAS           | Transport Independent Application Specific (Maximum) (TIAS) |    |
 | TIB          |   | Tree Information Base (TIB)  |    | | TIB          |   | Tree Information Base (TIB)  |    |
 +| TID          |   | Traffic Classification Identifier (TID)  |    |
 | TIM          |   | Traffic Indication Map (TIM)  |  | | TIM          |   | Traffic Indication Map (TIM)  |  |
 | TIMIP        |   | Terminal Independent Mobile IP (TIMIP)  |    | | TIMIP        |   | Terminal Independent Mobile IP (TIMIP)  |    |
Line 2986: Line 3013:
 | :::          |   | Transport Stream (TS)  |    | | :::          |   | Transport Stream (TS)  |    |
 | :::          |   | Tenant System (TS) |    | | :::          |   | Tenant System (TS) |    |
 +| :::          |   | Timestamp (TS)  |    |
 +| :::          |   | Timestamps (TS) |    |
 | TSA          |   | Time Stamping Authority |    | | TSA          |   | Time Stamping Authority |    |
 | TSCH           | Time-Slotted Channel Hopping (TSCH)  |    | | TSCH           | Time-Slotted Channel Hopping (TSCH)  |    |
Line 3000: Line 3029:
 | TSTN           | Temporal-Spatial Trade-off Notification (TSTN)  |    | | TSTN           | Temporal-Spatial Trade-off Notification (TSTN)  |    |
 | TSTR           | Temporal-Spatial Trade-off Request (TSTR)  |    | | TSTR           | Temporal-Spatial Trade-off Request (TSTR)  |    |
 +| TSval        |   | TS Value (TSval) | |
 | TT-PE        |   | Target Terminating Provider Edge (TT-PE)  |    | | TT-PE        |   | Target Terminating Provider Edge (TT-PE)  |    |
 | TTD          |   | Throughput Test Device (TTD)  |    | | TTD          |   | Throughput Test Device (TTD)  |    |
Line 3026: Line 3056:
 | :::          |   | Unavailable Seconds (UAS) |    | | :::          |   | Unavailable Seconds (UAS) |    |
 | :::          |   | Unmanned Aircraft System (UAS) | Used for both singular and plural (i.e., not "UASs" | | :::          |   | Unmanned Aircraft System (UAS) | Used for both singular and plural (i.e., not "UASs" |
 +| UCB          |   | UDP Control Block (UCB) | |
 | uCDN           | upstream Content Delivery Network (uCDN) |    | | uCDN           | upstream Content Delivery Network (uCDN) |    |
 | UCMP           | Unequal-Cost Multipath (UCMP) |    | | UCMP           | Unequal-Cost Multipath (UCMP) |    |
Line 3084: Line 3115:
 | USM          |   | User-based Security Model  |    | | USM          |   | User-based Security Model  |    |
 | USRK           | Usage Specific Root Keys (USRK)  |    | | USRK           | Usage Specific Root Keys (USRK)  |    |
 +| USS          |   | UAS Service Suppliers (USS) |    | 
 | UTC          | * | Coordinated Universal Time |    | | UTC          | * | Coordinated Universal Time |    |
 | UTF-8        | * | Unicode transformation format 8  |    | | UTF-8        | * | Unicode transformation format 8  |    |
Line 3205: Line 3237:
 | WRR          |   | Weighted Round Robin (WRR)  |    | | WRR          |   | Weighted Round Robin (WRR)  |    |
 | WS             | White Space (WS) |    | | WS             | White Space (WS) |    |
 +| WS             | Window Scale (WS) |    |
 | WSDL           | Web Services Description Language (WSDL)  |    | | WSDL           | Web Services Description Language (WSDL)  |    |
 | WSON           | Wavelength Switched Optical Network (WSON)  |    | | WSON           | Wavelength Switched Optical Network (WSON)  |    |
Line 3262: Line 3295:
 | ZKPP           | Zero-Knowledge Password Proof (ZKPP)  |    | | ZKPP           | Zero-Knowledge Password Proof (ZKPP)  |    |
 | ZRTP         | * | No expansion |    | | ZRTP         | * | No expansion |    |
-| ZSK          |   | Zone Signing Key (ZSK)  |    |+| ZSK          |   | Zone Signing Key (ZSK)  | |
abbrev_list.1750453242.txt.gz · Last modified: (external edit)

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki