Sun Microsystems, Inc.
spacerspacer
spacer www.sun.com docs.sun.com |
spacer
black dot
 
 
  Previous   Contents   Next 
   
 

Glossary

This glossary contains only definitions of new terms in this book that are not in the Sun Global Glossary. For definitions of other terms, see the Sun Global Glossary at http://docs.sun.com:80/ab2/coll.417.1/GLOBALGLOSS/@Ab2TocView.

address pool

A set of addresses that are designated by the home network administrator for use by mobile nodes that need a home address.

AES

Advanced Encryption Standard. A symmetric 128-bit block data encryption technique. The U.S. government adopted the Rijndael variant of the algorithm as its encryption standard in October 2000. AES replaces DES encryption as the government standard.

agent advertisement

A message that is periodically sent by home agents and foreign agents to advertise their presence on any attached link.

agent discovery

The process by which a mobile node determines if it has moved, its current location, and its care-of address on a foreign network.

anycast address

An IP address that is assigned to more than one interface (typically belonging to different nodes). A packet that is sent to an anycast address is routed to the nearest interface having that address. The packet's route is in compliance with the routing protocol's measure of distance.

asymmetric key cryptography

An encryption system in which the sender and receiver of a message use different keys to encrypt and decrypt the message. Asymmetric keys are used to establish a secure channel for symmetric key encryption. Diffie-Hellman is an example of an asymmetric key protocol. Contrast with symmetric key cryptography.

authentication header

An extension header that provides authentication and integrity (without confidentiality) to IP datagrams.

autoconfiguration

The process of a host automatically configuring its interfaces in IPv6.

bidirectional tunnel

A tunnel that can transmit datagrams in both directions.

binding table

A home agent table that associates a home address with a care-of address, including remaining lifetime and time granted.

Blowfish

A symmetric block cipher algorithm that takes a variable-length key from 32 bits to 448 bits. Its author, Bruce Schneier, claims that Blowfish is optimized for applications where the key does not change often.

care-of address

A mobile node's temporary address that is used as a tunnel exit point when the mobile node is connected to a foreign network.

Certificate Authority (CA)

A trusted third-party organization or company that issues digital certificates used to create digital signatures and public-private key pairs. The CA guarantees that the individual granted the unique certificate is who she or he claims to be.

DES

Data Encryption Standard. A symmetric-key encryption method developed in 1975 and standardized by ANSI in 1981 as ANSI X.3.92. DES uses a 56-bit key.

digital signature

A digital code that is attached to an electronically transmitted message that uniquely identifies the sender.

DSA

Digital Signature Algorithm. A public key algorithm with a variable key size from 512 to 1024 bits. It relies on SHA-1 for input.

Diffie-Hellman protocol

Also known as public key cryptography. An asymmetric cryptographic key agreement protocol that was developed by Diffie and Hellman in 1976. The protocol enables two users to exchange a secret key over an insecure medium without any prior secrets. Diffie-Hellman is used by the IKE protocol.

dual stack

In the context of IPv6 transition, a protocol stack that contains both IPv4 and IPv6, with the rest of the stack being identical.

encapsulating security header

An extension header that provides integrity and confidentiality to datagrams.

encapsulation

The process of a header and payload being placed in the first packet, which is subsequently placed in the second packet's payload.

failback

The process of switching back network access to an interface that has its repair detected.

failover

The process of switching network access from a failed interface to a good physical interface. Network access includes IPv4 unicast, multicast, and broadcast traffic, as well as IPv6 unicast and multicast traffic.

failure detection

The process of detecting when a NIC or the path from the NIC to some layer 3 device starts operating correctly after a failure.

firewall

Any device or software that protects an organization's private network or intranet from intrusion by external networks such as the Internet.

 
 
 
  Previous   Contents   Next