-
Notifications
You must be signed in to change notification settings - Fork 0
/
dictionary.js
269 lines (268 loc) · 72.4 KB
/
dictionary.js
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
// Sample dictionary data (replace with your actual dictionary data)
const dictionaryData = [
{"a": "HTML", "c": "Technology", "e": "Hypertext Markup Language", "d": "A markup language used for creating web pages"},
{"a": "CSS", "c": "Technology", "e": "Cascading Style Sheets", "d": "A stylesheet language used for describing the look and formatting of a document written in HTML"},
{"a": "API", "c": "Technology", "e": "Application Programming Interface", "d": "A set of rules and protocols that allows different software applications to communicate with each other"},
{"a": "5G", "c": "5G", "e": "Fifth Generation", "d": "The fifth generation of mobile network technology, offering faster data speeds and lower latency."},
{"a": "IoT", "c": "5G", "e": "Internet of Things", "d": "A network of interconnected devices and objects that can communicate and exchange data."},
{"a": "NR", "c": "5G", "e": "New Radio", "d": "The air interface standard for 5G wireless communication."},
{"a": "mmWave", "c": "5G", "e": "Millimeter Wave", "d": "A band of radio frequencies in the electromagnetic spectrum, used in 5G for high-speed data transmission."},
{"a": "MIMO", "c": "5G", "e": "Multiple-Input, Multiple-Output", "d": "A technology that uses multiple antennas for transmitting and receiving data, improving wireless communication."},
{"a": "URLLC", "c": "5G", "e": "Ultra-Reliable Low Latency Communication", "d": "A 5G feature that ensures extremely reliable and low-latency communication for critical applications."},
{"a": "5GC", "c": "5G", "e": "5G Core", "d": "The core network architecture for 5G, responsible for managing network functions and services."},
{"a": "SMF", "c": "5G", "e": "Session Management Function", "d": "A key component in the 5G Core network responsible for managing user sessions."},
{"a": "UPF", "c": "5G", "e": "User Plane Function", "d": "A network function in 5GC responsible for handling user data traffic."},
{"a": "AMF", "c": "5G", "e": "Access and Mobility Management Function", "d": "A function in 5GC responsible for access control and mobility management."},
{"a": "AUSF", "c": "5G", "e": "Authentication Server Function", "d": "A function in 5GC responsible for authentication and security."},
{"a": "UDM", "c": "5G", "e": "Unified Data Management", "d": "A network function that manages subscriber data and authentication in 5GC."},
{"a": "NSSF", "c": "5G", "e": "Network Slice Selection Function", "d": "A function in 5GC responsible for selecting the appropriate network slice for user services."},
{"a": "NSSAIF", "c": "5G", "e": "Network Slice Selection Assistance Information Function", "d": "A function in 5G responsible for providing information related to network slice selection."},
{"a": "NRF", "c": "5G", "e": "Network Repository Function", "d": "A function in 5G responsible for storing network function profiles and service information."},
{"a": "NEF", "c": "5G", "e": "Network Exposure Function", "d": "A function in 5G that exposes network capabilities and services to external applications."},
{"a": "UDR", "c": "5G", "e": "Unified Data Repository", "d": "A network function in 5G that stores subscriber data and user-related information."},
{"a": "IPUPS", "c": "5G", "e": "Inter-PLMN User Plane Security", "d": "In the 5GS security architecture the IPUPS functionality within UPF correlates user plane sessions over the N9 reference point with SMF control plane sessions and drop invalid user plane sessions if there is no match."},
{"a": "SUCI", "c": "5G", "e": "Subscription Concealed Identifier", "d": "A unique identifier in 5G that conceals a subscriber's identity for privacy and security purposes. The SUCI is used in authentication and signaling procedures within 5G networks to protect user identity while ensuring secure network access."},
{"a": "SUPI", "c": "5G", "e": "Subscription Permanent Identifier", "d": "An identifier in 5G that uniquely represents a subscriber's identity and subscription profile within a mobile network. The SUPI is used for various network functions, including authentication and authorization."},
{"a": "5GS", "c": "5G", "e": "5G System", "d": "The entire 5G network system, including radio access, core network, and services."},
{"a": "gNB", "c": "5G", "e": "5G New Radio Base Station", "d": "The base station in 5G that communicates with user devices over the air interface."},
{"a": "NFV", "c": "5G", "e": "Network Functions Virtualization", "d": "A technology and architectural framework in 5G that virtualizes network functions, allowing them to run as software instances on commodity hardware, providing flexibility and scalability in network deployment."},
{"a": "MNO", "c": "Mobile Networks", "e": "Mobile Network Operator", "d": "A company that provides mobile communication services to customers through its cellular network infrastructure."},
{"a": "MVNO", "c": "Mobile Networks", "e": "Mobile Virtual Network Operator", "d": "A company that provides mobile services by leasing network infrastructure from a Mobile Network Operator (MNO) without owning the underlying network."},
{"a": "PLMN", "c": "Mobile Networks", "e": "Public Land Mobile Network", "d": "A network used by MNOs to provide cellular services to the public."},
{"a": "VPLMN", "c": "Mobile Networks", "e": "Visited Public Land Mobile Network", "d": "A network in which a mobile device is currently roaming, typically outside its home network."},
{"a": "HPLMN", "c": "Mobile Networks", "e": "Home Public Land Mobile Network", "d": "The home network of a mobile subscriber."},
{"a": "IMSI", "c": "Mobile Networks", "e": "International Mobile Subscriber Identity", "d": "A unique identification number associated with a mobile subscriber."},
{"a": "SIM", "c": "Mobile Networks", "e": "Subscriber Identity Module", "d": "A physical card or chip that stores subscriber information, including the IMSI, and is used to authenticate a mobile device on a network."},
{"a": "eSIM", "c": "Mobile Networks", "e": "Embedded SIM", "d": "A SIM card that is integrated directly into a mobile device, eliminating the need for a physical SIM card."},
{"a": "IMEI", "c": "Mobile Networks", "e": "International Mobile Equipment Identity", "d": "A unique identification number associated with a mobile device."},
{"a": "SEPP", "c": "5G", "e": "Security Edge Protection Proxy", "d": "A network function in 5G responsible for providing security services at the network edge, protecting against various threats."},
{"a": "vSEPP", "c": "5G", "e": "Visited Security Edge Protection Proxy", "d": "A network function in 5G that provides security services at the network edge when a mobile device is roaming in a visited network."},
{"a": "hSEPP", "c": "5G", "e": "Home Security Edge Protection Proxy", "d": "A network function in 5G that provides security services at the network edge in the subscriber's home network."},
{"a": "IP", "c": "Networking", "e": "Internet Protocol", "d": "A set of rules governing the format of data packets and the addressing scheme for the Internet."},
{"a": "TCP", "c": "Networking", "e": "Transmission Control Protocol", "d": "A connection-oriented protocol that provides reliable data delivery in computer networks."},
{"a": "UDP", "c": "Networking", "e": "User Datagram Protocol", "d": "A connectionless protocol that provides low-latency, but unreliable, data delivery in computer networks."},
{"a": "EVC", "c": "Networking", "e": "Ethernet Virtual Circuit", "d": "A point-to-point or multipoint-to-multipoint Ethernet connection between customer devices provided by service providers."},
{"a": "EVPN", "c": "Networking", "e": "Ethernet Virtual Private Network", "d": "A network technology that extends Layer 2 Ethernet services over an IP or MPLS backbone network."},
{"a": "VPN", "c": "Networking", "e": "Virtual Private Network", "d": "A secure network that allows private communication over a public network like the Internet."},
{"a": "IPSec", "c": "Networking", "e": "Internet Protocol Security", "d": "A suite of protocols used to secure internet communications and data packets."},
{"a": "MAC", "c": "Networking", "e": "Media Access Control", "d": "A unique identifier assigned to network interfaces for communications on a physical network segment."},
{"a": "RADIUS", "c": "Networking", "e": "Remote Authentication Dial-In User Service", "d": "A protocol used for authentication, authorization, and accounting (AAA) of network access."},
{"a": "PPPoE", "c": "Networking", "e": "Point-to-Point Protocol over Ethernet", "d": "A network protocol that encapsulates PPP frames in Ethernet frames for broadband connections."},
{"a": "PPP", "c": "Networking", "e": "Point-to-Point Protocol", "d": "A data link layer protocol used for establishing a direct connection between two nodes in a network."},
{"a": "DHCP", "c": "Networking", "e": "Dynamic Host Configuration Protocol", "d": "A network protocol used to assign dynamic IP addresses to devices on a network."},
{"a": "SSH", "c": "Networking", "e": "Secure Shell", "d": "A cryptographic network protocol used for secure remote access to network devices."},
{"a": "SFTP", "c": "Networking", "e": "SSH File Transfer Protocol", "d": "A secure file transfer protocol that uses the SSH protocol for secure file transfers."},
{"a": "FTP", "c": "Networking", "e": "File Transfer Protocol", "d": "A standard network protocol used to transfer files between a client and a server."},
{"a": "LDAP", "c": "Networking", "e": "Lightweight Directory Access Protocol", "d": "A protocol used for accessing and managing directory information services."},
{"a": "OAM", "c": "Networking", "e": "Operations, Administration, and Maintenance", "d": "A set of network management activities to ensure the network's reliability and performance."},
{"a": "SNMP", "c": "Networking", "e": "Simple Network Management Protocol", "d": "A protocol used for managing and monitoring network devices."},
{"a": "SMTP", "c": "Networking", "e": "Simple Mail Transfer Protocol", "d": "A protocol used for sending email messages between servers."},
{"a": "POP3", "c": "Networking", "e": "Post Office Protocol version 3", "d": "A protocol used for retrieving email messages from a mail server."},
{"a": "IMAP", "c": "Networking", "e": "Internet Message Access Protocol", "d": "A protocol used for retrieving and managing email messages on a mail server."},
{"a": "IPX", "c": "Networking", "e": "Internetwork Packet Exchange", "d": "A network layer protocol used in some legacy networks, particularly Novell NetWare networks."},
{"a": "HTTP", "c": "Networking", "e": "Hypertext Transfer Protocol", "d": "A protocol used for transmitting hypertext and multimedia documents on the World Wide Web."},
{"a": "HTTPS", "c": "Networking", "e": "Hypertext Transfer Protocol Secure", "d": "A secure version of HTTP that encrypts data for secure web communication."},
{"a": "REST", "c": "Networking", "e": "Representational State Transfer", "d": "An architectural style for designing networked applications, often used in web services, emphasizing simplicity, scalability, and statelessness."},
{"a": "PoE", "c": "Networking", "e": "Power over Ethernet", "d": "A technology that allows electrical power to be transmitted over Ethernet cables, typically used to power network devices like IP phones and cameras."},
{"a": "MPLS", "c": "Networking", "e": "Multiprotocol Label Switching", "d": "A routing technique used in packet-switched networks to improve network performance and efficiency."},
{"a": "BGP", "c": "Networking", "e": "Border Gateway Protocol", "d": "A standardized exterior gateway protocol used to exchange routing and reachability information between autonomous systems on the Internet."},
{"a": "eBGP", "c": "Networking", "e": "External Border Gateway Protocol", "d": "A type of BGP used to exchange routing information between different autonomous systems."},
{"a": "iBGP", "c": "Networking", "e": "Internal Border Gateway Protocol", "d": "A type of BGP used to exchange routing information within the same autonomous system."},
{"a": "OSPF", "c": "Networking", "e": "Open Shortest Path First", "d": "A routing protocol used to determine the best path for routing data packets within an IP network."},
{"a": "VRRP", "c": "Networking", "e": "Virtual Router Redundancy Protocol", "d": "A network protocol that provides high availability by allowing multiple routers to work together in a virtual router group."},
{"a": "HSRP", "c": "Networking", "e": "Hot Standby Router Protocol", "d": "A Cisco-proprietary protocol similar to VRRP, used for router redundancy."},
{"a": "BFD", "c": "Networking", "e": "Bidirectional Forwarding Detection", "d": "A network protocol used to detect and quickly recover from failures in the data path."},
{"a": "LDP", "c": "Networking", "e": "Label Distribution Protocol", "d": "A protocol used in MPLS networks to establish label-switched paths."},
{"a": "MEP", "c": "Networking", "e": "Maintenance End Point", "d": "A point in a network where proactive or diagnostic monitoring and testing of network elements are performed."},
{"a": "ICMP", "c": "Networking", "e": "Internet Control Message Protocol", "d": "A network layer protocol used to send error and control messages, including ping requests and responses."},
{"a": "IPv6", "c": "Networking", "e": "Internet Protocol version 6", "d": "The most recent version of the Internet Protocol, designed to replace IPv4 and provide a larger address space."},
{"a": "NDP", "c": "Networking", "e": "Neighbor Discovery Protocol", "d": "A protocol used in IPv6 networks to discover and manage neighbors on the local link."},
{"a": "DNS", "c": "Networking", "e": "Domain Name System", "d": "A hierarchical distributed naming system for translating domain names into IP addresses."},
{"a": "DNSSEC", "c": "Networking", "e": "Domain Name System Security Extensions", "d": "A suite of extensions to DNS to improve the security of domain name resolutions."},
{"a": "ARP", "c": "Networking", "e": "Address Resolution Protocol", "d": "A protocol used to map an IP address to a physical (MAC) address in a local network."},
{"a": "MAC", "c": "Networking", "e": "Media Access Control", "d": "A sublayer of the data link layer responsible for controlling access to a shared network medium and ensuring data frames are transmitted reliably."},
{"a": "OLT", "c": "Optical Networks", "e": "Optical Line Terminal", "d": "A device in a passive optical network (PON) that connects the network to the user's premises and manages the distribution of optical signals."},
{"a": "ONT", "c": "Optical Networks", "e": "Optical Network Terminal", "d": "A device in a passive optical network (PON) located at the user's premises that interfaces with the optical network and provides services to the user."},
{"a": "PON", "c": "Optical Networks", "e": "Passive Optical Network", "d": "A telecommunications network that uses fiber-optic cables and passive components to distribute optical signals to multiple subscribers."},
{"a": "SFP", "c": "Optical Networks", "e": "Small Form-Factor Pluggable", "d": "A compact, hot-swappable transceiver module used in networking equipment to transmit and receive data over optical or electrical interfaces."},
{"a": "LTE", "c": "4G", "e": "Long-Term Evolution", "d": "A standard for wireless broadband communication, providing high data rates and low latency for mobile devices."},
{"a": "IMS", "c": "4G", "e": "IP Multimedia Subsystem", "d": "An architectural framework for delivering multimedia services over IP networks."},
{"a": "MSC", "c": "4G", "e": "Mobile Switching Center", "d": "A central component in a mobile network that connects calls and manages the mobile switching and call processing."},
{"a": "EPC", "c": "4G", "e": "Evolved Packet Core", "d": "The core network architecture in 4G LTE networks, responsible for packet switching and routing."},
{"a": "eNB", "c": "4G", "e": "Evolved NodeB", "d": "A base station in 4G LTE networks, responsible for wireless communication with mobile devices."},
{"a": "EUTRAN", "c": "4G", "e": "Evolved Universal Terrestrial Radio Access Network", "d": "The radio access network in 4G LTE networks, responsible for wireless communication and connectivity."},
{"a": "SGW", "c": "4G", "e": "Serving Gateway", "d": "A key network element in 4G LTE (Long-Term Evolution) networks that serves as the point of connection between the radio access network and the core network. SGW manages data routing and mobility for user devices."},
{"a": "PGW", "c": "4G", "e": "Packet Data Network Gateway", "d": "An essential component in 4G LTE networks responsible for managing IP address allocation, packet routing, and network connectivity for user devices, enabling data communication services."},
{"a": "UTRAN", "c": "Mobile Networks", "e": "Universal Terrestrial Radio Access Network", "d": "The radio access network in 3G (UMTS) mobile networks, responsible for wireless communication and connectivity."},
{"a": "GPRS", "c": "Mobile Networks", "e": "General Packet Radio Service", "d": "A mobile data service in 2G and 3G networks that allows data transmission in packets."},
{"a": "GSM", "c": "Mobile Networks", "e": "Global System for Mobile Communications", "d": "A standard for 2G mobile networks, providing digital cellular communication services."},
{"a": "GSMA", "c": "Organization", "e": "GSM Association", "d": "An industry organization representing the interests of mobile network operators worldwide."},
{"a": "RAN", "c": "Mobile Networks", "e": "Radio Access Network", "d": "The part of a mobile network responsible for connecting mobile devices to the core network."},
{"a": "RAT", "c": "Mobile Networks", "e": "Radio Access Technology", "d": "The technology or standard used for wireless communication in a mobile network, such as 2G, 3G, or 4G."},
{"a": "SMS", "c": "Mobile Networks", "e": "Short Message Service", "d": "A text messaging service available on mobile phones and other mobile devices."},
{"a": "NodeB", "c": "Mobile Networks", "e": "Node B", "d": "A base station in 3G (UMTS) mobile networks, responsible for wireless communication with mobile devices."},
{"a": "CDMA", "c": "Mobile Networks", "e": "Code Division Multiple Access", "d": "A digital cellular technology used in 2G and 3G mobile networks for transmitting data simultaneously over a shared channel."},
{"a": "UMTS", "c": "Mobile Networks", "e": "Universal Mobile Telecommunications System", "d": "A 3G mobile telecommunications standard that provides high-speed data and voice services, offering an evolution from 2G GSM networks."},
{"a": "RR", "c": "Networking", "e": "Route Reflector", "d": "A networking device used in BGP (Border Gateway Protocol) networks to reduce the number of BGP peer connections and improve routing scalability."},
{"a": "RR", "c": "DNS", "e": "Resource Record", "d": "A DNS data structure that contains information about a particular resource in the DNS database, such as IP address mappings or service locations."},
{"a": "NSEC", "c": "DNS", "e": "Next Secure Record", "d": "A DNS resource record used in DNSSEC to indicate the non-existence of a specific domain name between two existing domain names."},
{"a": "NSEC3", "c": "DNS", "e": "Next Secure Record Version 3", "d": "An extension of NSEC in DNSSEC that provides additional security by hashing domain names to protect against zone enumeration."},
{"a": "TLD", "c": "DNS", "e": "Top-Level Domain", "d": "The highest level in the hierarchical domain name system, representing categories of domain names such as .com, .org, and .net."},
{"a": "SOA", "c": "DNS", "e": "Start of Authority", "d": "A DNS resource record that indicates the authoritative server for a DNS zone and provides administrative information about the zone."},
{"a": "gTLD", "c": "DNS", "e": "Generic Top-Level Domain", "d": "A category of top-level domains in the DNS hierarchy that includes commonly used domain extensions like .com, .org, and .net."},
{"a": "ccTLD", "c": "DNS", "e": "Country Code Top-Level Domain", "d": "A category of top-level domains in the DNS hierarchy that corresponds to specific countries or territories, such as .us for the United States or .uk for the United Kingdom."},
{"a": "sTLD", "c": "DNS", "e": "Sponsored Top-Level Domain", "d": "A category of top-level domains in which registration is restricted to certain organizations or entities associated with a particular community or interest, such as .gov for government websites."},
{"a": "NS", "c": "DNS", "e": "Name Server", "d": "A DNS resource record type that specifies the authoritative name servers for a domain. NS records indicate which servers are responsible for providing DNS information for a specific domain, allowing domain resolution to occur."},
{"a": "CNAME", "c": "DNS", "e": "Canonical Name", "d": "A DNS resource record type used to create an alias or canonical name for a domain. CNAME records map an alias (or subdomain) to the canonical (or primary) domain name, enabling domain redirection and simplifying DNS management."},
{"a": "PTR", "c": "DNS", "e": "Pointer", "d": "A DNS resource record type used for reverse DNS (rDNS) lookups. PTR records map an IP address to a domain name, allowing the resolution of domain names from IP addresses, commonly used for email server verification."},
{"a": "DS", "c": "DNS", "e": "Delegation Signer", "d": "A DNS resource record used in DNSSEC (Domain Name System Security Extensions) to establish a chain of trust between parent and child domains. DS records are used to sign and verify DNS data, enhancing DNS security and preventing DNS spoofing attacks."},
{"a": "ASCII", "c": "Technology", "e": "American Standard Code for Information Interchange", "d": "A character encoding standard that represents text and control characters in computers, communication equipment, and other devices using a 7-bit binary code. It includes the basic set of characters used in the English language and various control codes for data communication."},
{"a": "UTF", "c": "Technology", "e": "Unicode Transformation Format", "d": "A standardized character encoding scheme used in computing to represent text and symbols from various writing systems and languages. UTF-8 and UTF-16 are commonly used variants that support multilingual text encoding."},
{"a": "UTF-8", "c": "Technology", "e": "Unicode Transformation Format 8-bit", "d": "A widely used character encoding standard that is part of the Unicode standard. UTF-8 can represent virtually all characters in the Unicode character set and is backward compatible with ASCII. It is commonly used for multilingual text encoding in computing and the web."},
{"a": "OFDM", "c": "Wireless Communication", "e": "Orthogonal Frequency-Division Multiplexing", "d": "A modulation technique used in wireless communication to transmit data by dividing it into multiple subcarriers that are orthogonal (non-interfering) with each other, allowing for efficient and robust data transmission."},
{"a": "QAM", "c": "Networking", "e": "Quadrature Amplitude Modulation", "d": "A modulation scheme used in both wired and wireless communication to encode digital data by varying the amplitude and phase of a carrier signal. It offers high data rates and is widely used in digital communication systems."},
{"a": "MSAN", "c": "Networking", "e": "Multi-Service Access Node", "d": "A telecommunications device used in network infrastructure to deliver various communication services, such as DSL and voice, to customers over a single platform."},
{"a": "DSLAM", "c": "Networking", "e": "Digital Subscriber Line Access Multiplexer", "d": "A network device that connects multiple customer DSL lines to a high-speed backbone network, enabling broadband internet access."},
{"a": "VDSL", "c": "Networking", "e": "Very High Bit Rate Digital Subscriber Line", "d": "A DSL technology that provides faster data transmission rates than traditional DSL, suitable for high-bandwidth applications."},
{"a": "DSL", "c": "Networking", "e": "Digital Subscriber Line", "d": "A family of technologies that use existing copper telephone lines for high-speed internet access."},
{"a": "SDSL", "c": "Networking", "e": "Symmetric Digital Subscriber Line", "d": "A DSL technology that offers equal data upload and download speeds, typically used for business applications."},
{"a": "ADSL", "c": "Networking", "e": "Asymmetric Digital Subscriber Line", "d": "A DSL technology that provides faster download speeds than upload speeds, commonly used for residential internet access."},
{"a": "SDH", "c": "Networking", "e": "Synchronous Digital Hierarchy", "d": "A standardized telecommunications technology used to transport digital signals over optical fiber networks."},
{"a": "ISDN", "c": "Networking", "e": "Integrated Services Digital Network", "d": "A set of communication standards that enables voice, video, and data services to be transmitted simultaneously over digital lines."},
{"a": "PSTN", "c": "Networking", "e": "Public Switched Telephone Network", "d": "The traditional circuit-switched telephone network that provides voice and data transmission services."},
{"a": "VoIP", "c": "Networking", "e": "Voice over Internet Protocol", "d": "A technology that enables voice communication and multimedia sessions over the internet using IP networks."},
{"a": "WAN", "c": "Networking", "e": "Wide Area Network", "d": "A network that spans a large geographical area, typically connecting multiple LANs or other networks."},
{"a": "WLAN", "c": "Networking", "e": "Wireless Local Area Network", "d": "A local area network that uses wireless communication technology to connect devices within a limited area, such as a home or office."},
{"a": "LAN", "c": "Networking", "e": "Local Area Network", "d": "A network of interconnected computers and devices within a limited geographical area, such as a home, office, or campus. LANs are used for sharing resources, such as files and printers, and enabling communication between devices."}, // Add more entries as needed
{"a": "DWDM", "c": "Optical Networks", "e": "Dense Wavelength Division Multiplexing", "d": "A technology used in optical communication networks to transmit multiple data signals simultaneously over a single optical fiber by using different wavelengths of light. DWDM significantly increases data capacity and transmission distances."},
{"a": "CWDM", "c": "Optical Networks", "e": "Coarse Wavelength Division Multiplexing", "d": "An optical networking technology that multiplexes several data signals onto a single optical fiber by using a few widely spaced wavelengths of light. CWDM is used for shorter-distance optical communication with lower data rates compared to DWDM."},
{"a": "GPON", "c": "Optical Networks", "e": "Gigabit Passive Optical Network", "d": "A broadband access technology that uses fiber-optic cables and passive components to provide high-speed internet, television, and telephone services to residential and business users. GPON offers high bandwidth and efficient data transmission in optical networks."},
{"a": "QoS", "c": "Networking", "e": "Quality of Service", "d": "A set of networking technologies and techniques used to manage and prioritize data traffic to ensure that critical applications receive the necessary bandwidth and meet performance requirements."},
{"a": "CoS", "c": "Networking", "e": "Class of Service", "d": "A method for categorizing and managing network traffic based on different service levels or priorities, often used in conjunction with QoS mechanisms."},
{"a": "DSCP", "c": "Networking", "e": "Differentiated Services Code Point", "d": "A field in an IP packet header that is used to classify and differentiate types of network traffic, allowing for fine-grained control of QoS policies."},
{"a": "VLAN", "c": "Networking", "e": "Virtual Local Area Network", "d": "A network segmentation technology that enables the creation of multiple isolated and logically independent LANs within a physical network infrastructure."},
{"a": "VRF", "c": "Networking", "e": "Virtual Routing and Forwarding", "d": "A technology that allows multiple instances of a routing table to coexist within a single router, providing network segmentation and isolation."},
{"a": "RD", "c": "Networking", "e": "Route Distinguisher", "d": "A value used in BGP (Border Gateway Protocol) to uniquely identify routes in a VPN (Virtual Private Network) environment."},
{"a": "RT", "c": "Networking", "e": "Route Target", "d": "A value used in BGP (Border Gateway Protocol) to specify the VPN membership of routes in a VPN-based network."},
{"a": "NTP", "c": "Networking", "e": "Network Time Protocol", "d": "A protocol used to synchronize the clocks of computer systems and network devices in a network. NTP ensures accurate and coordinated timekeeping, critical for various network operations and applications."},
{"a": "VoLTE", "c": "Mobile Networks", "e": "Voice over LTE", "d": "A technology that allows voice calls to be made over LTE (Long-Term Evolution) networks, providing high-quality voice communication alongside data services on 4G networks."},
{"a": "IPX", "c": "Mobile Networks", "e": "IP Exchange", "d": "A network infrastructure that facilitates the exchange of IP-based traffic and services between different mobile network operators. IPX is used to support roaming, interconnection, and various mobile services."},
{"a": "VoNR", "c": "5G", "e": "Voice over New Radio", "d": "A technology that enables voice calls to be made over 5G networks using the New Radio (NR) air interface. VoNR offers high-quality voice communication alongside data services on 5G networks."},
{"a": "NR", "c": "5G", "e": "New Radio", "d": "The air interface standard for 5G wireless communication, designed to provide enhanced data rates, low latency, and improved spectral efficiency compared to previous generations of wireless technologies."},
{"a": "AI", "c": "AI", "e": "Artificial Intelligence", "d": "A branch of computer science that focuses on creating systems and machines capable of performing tasks that typically require human intelligence, such as problem-solving, learning, and decision-making."},
{"a": "ML", "c": "AI", "e": "Machine Learning", "d": "A subset of artificial intelligence that involves the development of algorithms and models that enable computers to learn from and make predictions or decisions based on data."},
{"a": "DL", "c": "AI", "e": "Deep Learning", "d": "A subfield of machine learning that employs artificial neural networks with many layers (deep neural networks) to model and solve complex tasks, often used for tasks like image and speech recognition."},
{"a": "NLP", "c": "AI", "e": "Natural Language Processing", "d": "A field of AI focused on enabling computers to understand, interpret, and generate human language, facilitating communication between machines and humans."},
{"a": "CV", "c": "AI", "e": "Computer Vision", "d": "A branch of AI and image processing that focuses on enabling computers to interpret and understand visual information from the world, often used for tasks like object recognition and image analysis."},
{"a": "RL", "c": "AI", "e": "Reinforcement Learning", "d": "A machine learning paradigm where an agent learns to make sequences of decisions in an environment to maximize a cumulative reward, often used in autonomous systems and gaming."},
{"a": "GAN", "c": "AI", "e": "Generative Adversarial Network", "d": "A class of deep learning models consisting of two neural networks, a generator and a discriminator, that are trained together to generate realistic data or images."},
{"a": "LSTM", "c": "AI", "e": "Long Short-Term Memory", "d": "A type of recurrent neural network (RNN) that is capable of learning and remembering over long sequences, making it well-suited for tasks involving sequential data and time-series analysis."},
{"a": "GPT", "c": "AI", "e": "Generative Pre-trained Transformer", "d": "A family of natural language processing models based on the transformer architecture, known for their ability to generate human-like text and perform various language-related tasks, such as text generation and translation."},
{"a": "AGI", "c": "AI", "e": "Artificial General Intelligence", "d": "An advanced form of artificial intelligence that possesses human-level cognitive abilities, allowing it to understand, learn, and perform tasks across a wide range of domains, similar to human intelligence."},
{"a": "ANI", "c": "AI", "e": "Artificial Narrow Intelligence", "d": "A type of artificial intelligence that is specialized and limited in its capabilities, focusing on performing specific tasks or solving particular problems, without the broad cognitive abilities associated with AGI."},
{"a": "LLM", "c": "AI", "e": "Large Language Model", "d": "A type of artificial intelligence model designed to understand and generate human language. Large language models, such as GPT-3, are trained on extensive text corpora and can perform various natural language processing tasks, including text generation, translation, and question-answering."},
{"a": "FL", "c": "AI", "e": "Federated Learning", "d": "A machine learning approach that enables model training across decentralized edge devices or servers while keeping data localized. Federated Learning allows models to improve without sharing raw data, enhancing privacy and security in AI applications."},
{"a": "DNN", "c": "5G", "e": "Data Network Name", "d": "A term used in 5G networks to refer to a specific data network or service, identified by its name. DNNs are used to route and manage traffic for various services and applications within 5G networks."},
{"a": "DN", "c": "Mobile Networks", "e": "Data Network", "d": "A network that provides data communication services, enabling the transfer of digital data between devices and across the internet. Data networks are fundamental to mobile communication and internet connectivity."},
{"a": "RNN", "c": "AI", "e": "Recurrent Neural Network", "d": "A type of artificial neural network architecture designed for sequential data processing. RNNs have feedback connections that allow information to flow in cycles, making them suitable for tasks like natural language processing, time series analysis, and speech recognition."},
{"a": "APN", "c": "Mobile Networks", "e": "Access Point Name", "d": "A network-specific name that mobile devices use to connect to the internet. APNs are essential for configuring the data connection settings on mobile devices and determining how they access data services provided by mobile network operators."},
{"a": "RCS", "c": "Mobile Networks", "e": "Rich Communication Services", "d": "A suite of advanced messaging features and services designed to enhance text messaging on mobile devices. RCS includes features such as group chat, multimedia sharing, read receipts, and typing indicators, aiming to provide an enhanced messaging experience similar to instant messaging apps."},
{"a": "WAP", "c": "Mobile Networks", "e": "Wireless Application Protocol", "d": "A technical standard for accessing and interacting with information and services over wireless networks, primarily designed for mobile devices. WAP enables web browsing, email, and other internet-based services on mobile phones and early smartphones."},
{"a": "MMS", "c": "Mobile Networks", "e": "Multimedia Messaging Service", "d": "A communication service that allows users to send and receive multimedia messages, including text, images, audio, and video, over mobile networks. MMS enhances traditional SMS messaging by enabling the sharing of rich media content between mobile devices."},
{"a": "TLS", "c": "Networking", "e": "Transport Layer Security", "d": "A cryptographic protocol that provides secure communication over a network, ensuring data privacy and integrity. TLS is commonly used to secure web connections, email transmission, and other network communications."},
{"a": "SSL", "c": "Networking", "e": "Secure Sockets Layer", "d": "A predecessor to TLS, SSL is a cryptographic protocol used to secure network communications. While SSL is less secure than modern TLS versions, it played a significant role in the early development of secure internet connections."},
{"a": "DTLS", "c": "Networking", "e": "Datagram Transport Layer Security", "d": "A variation of the TLS (Transport Layer Security) protocol designed for securing communication over datagram-based transport protocols, such as UDP (User Datagram Protocol). DTLS provides encryption, authentication, and data integrity for secure data transfer in real-time and lossy network environments."},
{"a": "GRE", "c": "Networking", "e": "Generic Routing Encapsulation", "d": "A tunneling protocol used to encapsulate a wide variety of network layer protocols into point-to-point connections. GRE is commonly used to create virtual private networks (VPNs) and enable secure communication between network devices."},
{"a": "L2TP", "c": "Networking", "e": "Layer 2 Tunneling Protocol", "d": "A protocol used for establishing virtual private networks (VPNs) or secure connections over public networks. L2TP combines the features of the PPTP and L2F protocols and is often used in conjunction with IPsec for enhanced security."},
{"a": "PPTP", "c": "Networking", "e": "Point-to-Point Tunneling Protocol", "d": "A networking protocol used for creating virtual private networks (VPNs) or secure connections over public networks. PPTP encapsulates data in point-to-point connections and is commonly used for remote access VPNs."},
{"a": "GTP", "c": "Mobile Networks", "e": "GPRS Tunneling Protocol", "d": "A protocol used in mobile networks, such as 2G, 3G, and 4G, to carry control and user data between network elements. GTP facilitates the routing and management of data traffic in mobile networks."},
{"a": "GTP-U", "c": "Mobile Networks", "e": "GPRS Tunneling Protocol - User Plane", "d": "A specific variant of the GPRS Tunneling Protocol (GTP) responsible for carrying user data traffic between network elements in mobile networks. GTP-U handles the user plane data transmission."},
{"a": "GTP-C", "c": "Mobile Networks", "e": "GPRS Tunneling Protocol - Control Plane", "d": "A specific variant of the GPRS Tunneling Protocol (GTP) responsible for carrying control and signaling information between network elements in mobile networks. GTP-C handles the control plane functions of the protocol."},
{"a": "SCTP", "c": "Networking", "e": "Stream Control Transmission Protocol", "d": "A transport layer protocol that provides reliable, connection-oriented communication between two networked endpoints. SCTP is designed to support concurrent data streams, message framing, and fault tolerance, making it suitable for various applications, including telephony and messaging services."},
{"a": "SS7", "c": "Mobile Networks", "e": "Signaling System No. 7", "d": "A telecommunications signaling protocol used to set up, manage, and tear down phone calls in traditional circuit-switched networks. SS7 plays a crucial role in call routing, SMS messaging, and other network signaling functions in both fixed-line and mobile telecommunication networks."},
{"a": "SIP", "c": "Mobile Networks", "e": "Session Initiation Protocol", "d": "A communication protocol used for initiating, maintaining, modifying, and terminating real-time sessions, such as voice and video calls, over IP networks. SIP is a key protocol for voice over IP (VoIP) and multimedia communication services in mobile networks and the internet."},
{"a": "RTSP", "c": "Mobile Networks", "e": "Real-Time Streaming Protocol", "d": "A network protocol designed for controlling the delivery of real-time multimedia content, such as audio and video streaming, over IP networks. RTSP enables clients to request and control the playback of streaming media from servers, making it a fundamental protocol for multimedia streaming applications."},
{"a": "XHR", "c": "Technology", "e": "XMLHttpRequest", "d": "A JavaScript API used for making asynchronous HTTP requests to a server, enabling dynamic updates of web pages without the need for a full page reload. XHR is commonly used in web development to fetch and send data between a web application and a server."},
{"a": "CSRF", "c": "Technology", "e": "Cross-Site Request Forgery", "d": "A security vulnerability that occurs when an attacker tricks a user into executing unintended actions on a web application in which the user is authenticated. CSRF attacks can lead to unauthorized actions and data manipulation."},
{"a": "CSP", "c": "Technology", "e": "Content Security Policy", "d": "A security feature implemented by web servers to mitigate cross-site scripting (XSS) and data injection attacks. CSP defines a policy that restricts the sources and types of content that a web page can load or execute, enhancing web application security."},
{"a": "JWT", "c": "Technology", "e": "JSON Web Token", "d": "A compact and self-contained method for securely transmitting information between parties as a JSON object. JWTs are commonly used for authentication and authorization in web applications, allowing for the sharing of claims or attributes between systems."},
{"a": "JSP", "c": "Technology", "e": "JavaServer Pages", "d": "A technology used for developing dynamic web pages in Java-based web applications. JSP enables the embedding of Java code within HTML to generate dynamic content on web pages."},
{"a": "JSON", "c": "Technology", "e": "JavaScript Object Notation", "d": "A lightweight data interchange format that is easy for humans to read and write and easy for machines to parse and generate. JSON is commonly used for data serialization and communication between web services and clients."},
{"a": "XML", "c": "Technology", "e": "Extensible Markup Language", "d": "A markup language that defines a set of rules for encoding documents in a format that is both human-readable and machine-readable. XML is used for data interchange between different systems, particularly in web services and configuration files."},
{"a": "XSD", "c": "Technology", "e": "XML Schema Definition", "d": "A specification language used to define the structure and constraints of XML documents. XSD is employed for validating and enforcing the integrity of XML data."},
{"a": "XSLT", "c": "Technology", "e": "Extensible Stylesheet Language Transformations", "d": "A language used for transforming XML documents into different formats, such as HTML, XML, or plain text. XSLT is commonly used for rendering XML data and applying stylesheets."},
{"a": "WSDL", "c": "Technology", "e": "Web Services Description Language", "d": "A standard XML-based language used to describe the functionality offered by a web service and the means to access it. WSDL is integral to the communication and interaction between web services."},
{"a": "FIDO", "c": "Technology", "e": "Fast Identity Online", "d": "An open standard for secure authentication that aims to reduce reliance on passwords. FIDO enables the use of various authentication methods, such as biometrics and hardware tokens, to enhance online security."},
{"a": "OAuth", "c": "Technology", "e": "Open Authorization", "d": "A protocol used for granting secure and limited access to resources without disclosing user credentials. OAuth is widely used for authorization in web and mobile applications, enabling third-party access to protected resources."},
{"a": "CSS", "c": "Technology", "e": "Cascading Style Sheets", "d": "A style sheet language used for describing the presentation and formatting of HTML and XML documents. CSS is widely employed in web development to control the layout, design, and appearance of web pages."},
{"a": "HTML", "c": "Technology", "e": "Hypertext Markup Language", "d": "A markup language used to create the structure and content of web pages. HTML provides a set of elements and tags that define the layout, text, images, and multimedia elements on a web page."},
{"a": "FIDO2", "c": "Technology", "e": "Fast Identity Online 2", "d": "An authentication standard that extends FIDO (Fast Identity Online) to support passwordless and multi-factor authentication. FIDO2 enables secure and convenient authentication methods, enhancing online security."},
{"a": "U2F", "c": "Technology", "e": "Universal 2nd Factor", "d": "A standard for two-factor authentication that uses hardware security tokens, such as USB devices, to provide an additional layer of security during the authentication process. U2F enhances account security by requiring a physical token in addition to a password."},
{"a": "2FA", "c": "Technology", "e": "Two-Factor Authentication", "d": "A security mechanism that requires users to provide two different authentication factors to access an account or system. F2A typically combines something the user knows (e.g., a password) with something the user has (e.g., a smartphone or hardware token)."},
{"a": "JWE", "c": "Technology", "e": "JSON Web Encryption", "d": "A standard for securely encrypting data in JSON format. JWE defines methods for encrypting data using various encryption algorithms, making it suitable for secure data transmission and storage."},
{"a": "JWS", "c": "Technology", "e": "JSON Web Signature", "d": "A standard for digitally signing data in JSON format to ensure its authenticity and integrity. JWS provides a way to create verifiable digital signatures for JSON data, making it suitable for secure data transmission and validation."},
{"a": "TDMA", "c": "Mobile Networks", "e": "Time Division Multiple Access", "d": "A digital wireless communication technique that divides a radio frequency into multiple time slots, allowing multiple users or devices to share the same frequency channel by transmitting data in sequential time intervals. TDMA is commonly used in mobile networks to efficiently allocate and manage radio resources."},
{"a": "AAA", "c": "Networking", "e": "Authentication, Authorization, and Accounting", "d": "A comprehensive framework and set of protocols used in network security and management. AAA encompasses three core functions: Authentication (verifying the identity of users or devices), Authorization (determining the permissions and access rights of authenticated entities), and Accounting (logging and tracking the usage of network resources). It plays a critical role in ensuring secure and accountable network access and services."},
{"a": "CMTS", "c": "Networking", "e": "Cable Modem Termination System", "d": "A network component used in cable television systems to manage and control the communication between cable modems (CMs) and the internet service provider's (ISP) network. The CMTS enables the delivery of broadband internet access to subscribers over cable TV infrastructure, facilitating data transmission and communication between cable modems and the ISP's network."},
{"a": "DOCSIS", "c": "Networking", "e": "Data Over Cable Service Interface Specification", "d": "A set of international standards that define the protocols and specifications for transmitting data over cable television (CATV) networks. DOCSIS enables the provision of high-speed internet access and other data services to subscribers through cable modems. It governs various aspects of network communication, including channel bonding, quality of service (QoS), and security."},
{"a": "CPE", "c": "Networking", "e": "Customer Premises Equipment", "d": "Devices and equipment located at the customer's premises that are used to connect to and access services from a telecommunications or internet service provider. Common examples of CPE include modems, routers, and set-top boxes."},
{"a": "LER", "c": "Networking", "e": "Label Edge Router", "d": "A type of router in a Multiprotocol Label Switching (MPLS) network that is responsible for applying labels to incoming data packets and determining how to forward them based on the labels. LERs play a crucial role in MPLS traffic engineering and routing."},
{"a": "LSR", "c": "Networking", "e": "Label Switch Router", "d": "A router in a Multiprotocol Label Switching (MPLS) network that is capable of forwarding data packets based on the labels assigned to them. LSRs make forwarding decisions using label information rather than traditional IP routing tables."},
{"a": "PE", "c": "Networking", "e": "Provider Edge", "d": "A router or network device at the edge of a service provider's network that connects to customer networks or other provider networks. PE devices are responsible for maintaining separate routing and forwarding tables for each customer or network connection, ensuring isolation and traffic management."},
{"a": "UE", "c": "Mobile Networks", "e": "User Equipment", "d": "The term used to describe the end-user devices or equipment in a mobile communication network. UEs encompass a wide range of devices, including smartphones, tablets, laptops, and other devices that can connect to and communicate over mobile networks. UEs play a vital role in accessing mobile services and applications."},
{"a": "CDR", "c": "Mobile Networks", "e": "Call Detail Record", "d": "A data record generated by a telecommunications or mobile network that contains detailed information about a specific call or communication session. CDRs typically include data such as call start and end times, call duration, call parties, call type (e.g., voice, SMS, data), and other relevant information. These records are crucial for billing, network management, and quality of service analysis in mobile networks."},
{"a": "TMF", "c": "Organization", "e": "TeleManagement Forum", "d": "An industry association and consortium that develops and maintains standards, best practices, and frameworks for the management and operation of telecommunications and digital services. TMF's work encompasses areas such as service assurance, billing, and digital transformation in the telecom industry."},
{"a": "EFM", "c": "Networking", "e": "Ethernet First Mile", "d": "A technology and standard that extends Ethernet services to the customer's premises over existing copper infrastructure. EFM enables high-speed data transmission and broadband connectivity for businesses and homes using Ethernet-based technologies."},
{"a": "eTOM", "c": "Networking", "e": "Enhanced Telecom Operations Map", "d": "A widely adopted framework and model for the management and operation of telecommunications services. eTOM provides a comprehensive view of telecom business processes, facilitating process improvement, standardization, and alignment with industry best practices."},
{"a": "MEF", "c": "Organization", "e": "Metro Ethernet Forum", "d": "An industry association and standards organization focused on the development and adoption of Ethernet services and technologies in metro and wide area networks. MEF defines specifications and certifications to enable the delivery of reliable and scalable Ethernet services."},
{"a": "EOAM", "c": "Networking", "e": "Ethernet Operations, Administration, and Maintenance", "d": "A set of standardized operations, administration, and maintenance functions for Ethernet-based networks. EOAM includes tools and protocols that enable network operators to monitor, manage, and troubleshoot Ethernet networks, ensuring their reliability and performance. It plays a crucial role in maintaining Ethernet-based services and infrastructure."},
{"a": "IEEE", "c": "Organization", "e": "Institute of Electrical and Electronics Engineers", "d": "A professional organization and global association of engineers, scientists, and technical professionals. IEEE is dedicated to advancing technology and innovation across various fields, including electrical engineering, electronics, computer science, and telecommunications. It plays a pivotal role in developing standards, publishing research, and fostering collaboration within the technical community."},
{"a": "3GPP", "c": "Organization", "e": "3rd Generation Partnership Project", "d": "A global collaboration of telecommunications standards development organizations that defines specifications and standards for mobile communication networks, including 3G, 4G, and 5G technologies. 3GPP plays a central role in shaping the evolution of mobile communications."},
{"a": "ITU", "c": "Organization", "e": "International Telecommunication Union", "d": "A specialized United Nations agency that focuses on information and communication technologies (ICT). ITU develops global standards, allocates radio spectrum, and promotes digital inclusion to facilitate worldwide connectivity and telecommunications development."},
{"a": "IETF", "c": "Organization", "e": "Internet Engineering Task Force", "d": "A global open standards organization that develops and publishes protocols and standards for the internet. IETF's work encompasses areas such as internet architecture, network protocols, and internet-related technologies, enabling interoperability and innovation on the internet."},
{"a": "W3C", "c": "Organization", "e": "World Wide Web Consortium", "d": "An international community and standards organization that focuses on developing open and interoperable technologies for the World Wide Web. W3C is known for its contributions to web standards, including HTML, CSS, and web accessibility guidelines, to ensure a consistent and accessible web experience."},
{"a": "MCC", "c": "Mobile Networks", "e": "Mobile Country Code", "d": "A three-digit code within the International Mobile Subscriber Identity (IMSI) that uniquely identifies the country or geographical region of a mobile subscriber. MCC is an essential component in mobile network addressing and roaming agreements."},
{"a": "MNC", "c": "Mobile Networks", "e": "Mobile Network Code", "d": "A two- or three-digit code within the International Mobile Subscriber Identity (IMSI) that uniquely identifies a mobile network operator within a specific country or region. MNC is used in combination with MCC to identify a mobile subscriber's network operator."},
{"a": "MSISDN", "c": "Mobile Networks", "e": "Mobile Subscriber Integrated Services Digital Network Number", "d": "A globally unique phone number assigned to a mobile subscriber in a mobile network. The MSISDN typically includes the country code, national destination code, and subscriber number, allowing for the direct dialing of mobile devices."},
{"a": "YAML", "c": "Technology", "e": "YAML Ain't Markup Language", "d": "A human-readable data serialization format used for configuration files and data exchange. YAML uses indentation and a simple syntax to represent structured data, making it easy for both humans to read and machines to parse. It is commonly used in software configuration, data storage, and configuration management."},
{"a": "UML", "c": "Technology", "e": "Unified Modeling Language", "d": "A standardized visual modeling language used in software engineering and systems modeling to depict, design, and communicate the structure and behavior of complex systems. UML employs various diagrams and notations to represent software architecture, design patterns, and system interactions, facilitating software development and system analysis."},
{"a": "BPEL", "c": "Technology", "e": "Business Process Execution Language", "d": "A standardized language used in service-oriented architecture (SOA) and business process management (BPM) to define and orchestrate business processes and workflows. BPEL allows for the modeling, execution, and coordination of complex business processes across different services and systems."},
{"a": "SOA", "c": "Technology", "e": "Service-Oriented Architecture", "d": "An architectural approach and design paradigm for developing software systems and applications that are composed of loosely coupled and interoperable services. SOA emphasizes the use of services as fundamental building blocks, enabling flexibility, reusability, and integration across distributed and heterogeneous systems."},
{"a": "DMARC", "c": "Technology", "e": "Domain-based Message Authentication, Reporting, and Conformance", "d": "An email authentication and policy framework that helps protect email senders and recipients from domain spoofing and phishing attacks. DMARC allows domain owners to specify email authentication policies, receive reports on email delivery, and instruct email receivers on how to handle unauthenticated messages."},
{"a": "DKIM", "c": "Technology", "e": "DomainKeys Identified Mail", "d": "An email authentication method that allows an organization to take responsibility for an email's content and verify its authenticity. DKIM uses digital signatures to associate a domain with an email message, enhancing email integrity and reducing the likelihood of email forgery or tampering."},
{"a": "DANE", "c": "DNS", "e": "DNS-Based Authentication of Named Entities", "d": "A security protocol that enhances the security of digital certificates used in TLS/SSL encryption by tying them to DNS records. DANE leverages DNSSEC (Domain Name System Security Extensions) to ensure the authenticity of SSL/TLS certificates, providing an additional layer of trust and security for online communications."},
{"a": "LACP", "c": "Networking", "e": "Link Aggregation Control Protocol", "d": "A standardized networking protocol used to dynamically manage and bundle multiple physical network connections into a single logical link or channel. LACP allows for the creation of high-speed, redundant, and load-balanced connections between network devices, enhancing network reliability and performance."},
{"a": "LAG", "c": "Networking", "e": "Link Aggregation Group", "d": "A logical grouping of multiple physical network links that are combined to function as a single, higher-capacity link. LAGs are created using protocols like LACP to provide redundancy, load balancing, and increased bandwidth in network connections, commonly used in data center and enterprise networking."},
{"a": "HDLC", "c": "Networking", "e": "High-Level Data Link Control", "d": "A synchronous data link layer protocol used for communication between devices over point-to-point and multipoint links. HDLC provides a reliable and efficient means of transmitting data, offering various modes of operation, including normal response mode (NRM) and asynchronous balanced mode (ABM). It has served as the basis for other protocols like LAPB (Link Access Procedure, Balanced) and LAPD (Link Access Procedure on the D Channel)."},
{"a": "SLIP", "c": "Networking", "e": "Serial Line Internet Protocol", "d": "A simple and older protocol used for transmitting IP packets over serial communication links, such as RS-232. SLIP lacks features like error detection and correction, making it less reliable than other protocols like PPP (Point-to-Point Protocol). While it has been used for internet connectivity in the past, it is considered outdated and has been largely replaced by more robust protocols."},
{"a": "ATM", "c": "Networking", "e": "Asynchronous Transfer Mode", "d": "A high-speed switching and multiplexing technology that operates at both Layer 1 and Layer 2 of the OSI model. ATM was originally designed for both LAN and WAN communication, offering fixed-size cells (53 bytes) for efficient data transmission. It has been used in various network types, including broadband networks and telecommunications, for the transport of voice, data, and video traffic."},
{"a": "VC", "c": "Networking", "e": "Virtual Circuit", "d": "A logical communication path or channel established within a network, often in the context of packet-switched networks like Frame Relay and ATM (Asynchronous Transfer Mode). Virtual circuits provide a connection-oriented and predictable way to transmit data packets between network nodes. They can be either permanent (PVC) or switched (SVC), depending on whether they are pre-configured or dynamically established."},
{"a": "OSI", "c": "Technology", "e": "Open Systems Interconnection", "d": "A conceptual framework and set of standards that define the functions and interactions of networking protocols and services in computer networks. OSI, developed by the International Organization for Standardization (ISO), consists of seven layers, each responsible for specific aspects of network communication. The OSI model serves as a reference for understanding and designing network architectures and protocols."},
{"a": "ISO", "c": "Organization", "e": "International Organization for Standardization", "d": "A global standardization body that develops and publishes international standards across various industries and sectors. ISO is known for creating standards that ensure product quality, safety, and interoperability. It plays a crucial role in promoting global consistency and facilitating international trade by providing a common framework for organizations and industries to follow."},
{"a": "DECT", "c": "Mobile Networks", "e": "Digital Enhanced Cordless Telecommunications", "d": "A wireless communication standard used for cordless phones and other short-range wireless communication devices. DECT provides a means for voice and data transmission between devices within a short distance, typically within a home or office environment."},
{"a": "QUIC", "c": "Networking", "e": "Quick UDP Internet Connections", "d": "A modern transport layer protocol developed by Google that is designed to improve the speed, security, and reliability of internet communication. QUIC operates over UDP (User Datagram Protocol) and includes built-in encryption and multiplexing features. It is used for various internet services, including web browsing and online applications, to reduce latency and enhance performance."},
{"a": "ICCID", "c": "Mobile Networks", "e": "Integrated Circuit Card Identifier", "d": "A unique identification number associated with a SIM (Subscriber Identity Module) card in a mobile device. The ICCID is a long numeric code typically printed on the SIM card and is used to uniquely identify the card within the mobile network. It is essential for activities such as SIM card activation and tracking."},
{"a": "CSMA/CD", "c": "Networking", "e": "Carrier Sense Multiple Access with Collision Detection", "d": "A network protocol used in Ethernet LANs to manage access to the shared network medium. CSMA/CD enables devices to listen for carrier signals on the network before attempting to transmit data. If a collision is detected during transmission, devices follow a backoff algorithm to retry sending data. CSMA/CD was widely used in Ethernet networks but is now less common due to the prevalence of full-duplex Ethernet."},
{"a": "MTU", "c": "Networking", "e": "Maximum Transmission Unit", "d": "The maximum size, in bytes, of a single data packet or frame that can be transmitted over a network protocol without fragmentation. The MTU value is specific to each network technology and is determined by factors such as the physical medium and protocol specifications. Adjusting the MTU can impact network efficiency and performance, as smaller MTU sizes reduce the maximum data payload size and may require packet fragmentation and reassembly."},
{"a": "AS", "c": "Networking", "e": "Autonomous System", "d": "A collection of IP networks and routers under the control of a single organization or entity that presents a common routing policy to the internet. Autonomous Systems are identified by unique numbers known as AS numbers, and they play a crucial role in the Border Gateway Protocol (BGP), which is used for inter-domain routing on the internet. ASes are responsible for routing traffic within their network and exchanging routing information with other ASes."},
{"a": "RIP", "c": "Networking", "e": "Routing Information Protocol", "d": "A distance-vector routing protocol used for routing data across IP networks. RIP is one of the oldest routing protocols and operates based on hop count, with a maximum hop count limit. It is used to determine the best path for data packets to reach their destination within a network. RIP has multiple versions, with RIPv1 and RIPv2 being common implementations, and is used in smaller networks due to its simplicity."},
{"a": "UNI", "c": "Networking", "e": "User Network Interface", "d": "A standardized interface that defines the point of interconnection between a customer's network equipment and a service provider's network. UNI is typically used in telecommunications networks, including ATM (Asynchronous Transfer Mode) and Ethernet networks. It specifies the protocols, signaling, and functions required for communication between the customer's equipment and the network provider's equipment."},
{"a": "NNI", "c": "Networking", "e": "Network Network Interface", "d": "An interface used in telecommunications networks to define the point of interconnection between two network provider's networks. NNI facilitates the exchange of data, signaling, and routing information between different network service providers. It ensures proper communication and coordination between network domains and is essential for the functioning of complex networks, such as MPLS (Multiprotocol Label Switching) networks."},
{"a": "eNNI", "c": "Networking", "e": "External Network Network Interface", "d": "An extension of the NNI (Network Network Interface) used in telecommunications networks. eNNI defines the point of interconnection between two different network service providers at the edge of their networks. It is designed to enable the exchange of data, signaling, and routing information between external networks, facilitating the seamless flow of traffic and services across multiple service providers' domains."},
{"a": "iNNI", "c": "Networking", "e": "Internal Network Network Interface", "d": "An interface used within a single network provider's infrastructure to define the point of interconnection between different segments or domains of the provider's network. iNNI facilitates the exchange of data, signaling, and routing information between internal network components or domains, ensuring seamless communication and coordination within the network provider's infrastructure."},
{"a": "POTS", "c": "Networking", "e": "Plain Old Telephone Service", "d": "A traditional and standard telephone service that uses analog technology for voice communication over copper telephone lines. POTS provides basic voice calling capabilities and has been widely used for residential and business telephone services. It is characterized by its simplicity and reliability, offering a dedicated phone line for voice calls without advanced features like internet access or digital data transmission."},
{"a": "IAD", "c": "Networking", "e": "Integrated Access Device", "d": "A multifunctional networking device that combines various telecommunications and data communication functions into a single unit. IADs are commonly used in telecommunications networks to provide access to services such as voice, data, and internet connectivity. They often include features like voice ports, data interfaces, and routing capabilities, making them versatile tools for connecting to different types of networks and services."},
{"a": "SID", "c": "Technology", "e": "Service Information Data", "d": "In the context of the TMF (Telemanagement Forum) framework, SID refers to Service Information Data. SID is a standardized and structured representation of service-related information, including products, services, resources, and their relationships within a telecommunications or service provider environment. The TMF SID model is used to enable efficient service management, provisioning, and assurance across complex network and service infrastructures."},
{"a": "FTTH", "c": "Optical Networks", "e": "Fiber to the Home", "d": "A broadband internet access technology that deploys optical fiber cables directly to individual residences or homes. FTTH provides high-speed internet connections with extremely fast download and upload speeds, making it suitable for delivering various services, including internet, television, and telephone services, directly to households."},
{"a": "FTTC", "c": "Optical Networks", "e": "Fiber to the Curb", "d": "A broadband access technology that brings optical fiber cables closer to the end-users by terminating them at a curb or neighborhood distribution point. FTTC reduces the length of traditional copper cables, improving internet speeds and performance for subscribers within a certain distance of the curb. It is a compromise between FTTH and traditional copper-based DSL (Digital Subscriber Line) technologies."},
{"a": "FTTB", "c": "Optical Networks", "e": "Fiber to the Building", "d": "A broadband access technology that deploys optical fiber cables to a multi-unit building, such as an apartment complex or office building. FTTB connects the building's telecommunications infrastructure to the fiber network, offering high-speed internet and other services to all units within the building. It provides faster and more reliable connections compared to traditional copper-based solutions."},
{"a": "KVz", "c": "Netzwerk", "e": "Kabelverzweiger", "d": "Ein Verteilerpunkt in einem Telekommunikationsnetzwerk, an dem Hauptleitungen in verschiedene Zweigleitungen aufgeteilt werden, um die Versorgung von Haushalten oder Unternehmen mit Telefon- und Datenverbindungen zu ermöglichen. KVz spielt eine wichtige Rolle in der Verteilung von Kommunikationssignalen in lokalen Telefonnetzen."},
{"a": "APL", "c": "Netzwerk", "e": "Anschlusspunkt Linientechnik", "d": "Ein Punkt in einem Telekommunikationsnetzwerk, an dem verschiedene Leitungen oder Technologien miteinander verbunden sind, um den Zugang zu Telefon- und Datenkommunikationsdiensten bereitzustellen. APL dient als Schnittstelle zwischen dem Netzwerkanbieter und dem Endkunden und ermöglicht die Bereitstellung von Diensten an einem bestimmten Standort."},
{"a": "TAE", "c": "Netzwerk", "e": "Telekommunikations-Anschluss-Einheit", "d": "Eine standardisierte Anschlusseinheit, die in deutschen Telekommunikationsnetzen verwendet wird. Die TAE dient dazu, Telefon- und Datengeräte an das Telefonnetz anzuschließen. Sie umfasst Buchsen und Anschlüsse für Telefonstecker und kann in deutschen Haushalten und Büros gefunden werden."},
{"a": "BNG", "c": "Networking", "e": "Broadband Network Gateway", "d": "A networking device that plays a crucial role in managing and routing broadband internet traffic within a service provider's network. BNGs are responsible for authenticating, authorizing, and providing access to broadband subscribers. They also perform tasks such as Quality of Service (QoS) management and traffic shaping to ensure efficient and reliable broadband service delivery."},
{"a": "BRAS", "c": "Networking", "e": "Broadband Remote Access Server", "d": "A network server that connects remote broadband users to the internet or a service provider's network. BRAS serves as a point of aggregation for broadband traffic, allowing users to establish secure and authenticated connections. It plays a key role in managing user access, enforcing policies, and ensuring the efficient delivery of broadband services to subscribers."},
{"a": "BTS", "c": "Mobile Networks", "e": "Base Transceiver Station", "d": "A fundamental component of a cellular network that facilitates wireless communication between mobile devices (e.g., cell phones) and the network infrastructure. The BTS is responsible for transmitting and receiving voice and data signals to and from mobile devices. It plays a crucial role in providing coverage and capacity in a cellular network and is often equipped with antennas and radio transceivers."},
{"a": "RNC", "c": "Mobile Networks", "e": "Radio Network Controller", "d": "In 3G and earlier cellular networks, the Radio Network Controller (RNC) is a critical component responsible for controlling and managing multiple Base Stations (Node Bs). The RNC plays a central role in call setup, handovers, resource allocation, and mobility management within the Radio Access Network (RAN). It ensures efficient operation and optimization of radio resources."},
{"a": "RRH", "c": "5G", "e": "Remote Radio Head", "d": "A key component in modern cellular networks, including 4G LTE and 5G, the Remote Radio Head (RRH) is responsible for transmitting and receiving radio signals. RRHs are typically deployed at the cell site and are connected to a centralized baseband unit (BBU) via fiber optic or other high-capacity links. This architecture enables greater flexibility and centralized control of the radio components while reducing signal loss."},
{"a": "SDN", "c": "Networking", "e": "Software-Defined Networking", "d": "An innovative approach to network management and architecture that separates the control plane from the data plane in networking devices. SDN allows network administrators to programmatically control and manage network resources through software applications. It enhances network flexibility, scalability, and automation, making it easier to adapt to changing traffic patterns and application requirements. SDN is widely used in data centers, cloud computing, and modern network infrastructures to optimize network performance and efficiency."},
];