Internet Impact Assessment Toolkit – Glossary
Application Programming Interface (API)
A protocol defining computer interaction with an application along with the technical facilities that implement it. It allows multiple applications to interact with each other.
Border Gateway Protocol (BGP)
A protocol to exchange routing information allowing participating networks to build a “roadmap” of the Internet. Using this “roadmap” each network knows where to pass datagrams on their way to the destination.
Common Global Identifiers
Common global identifiers are used to uniquely identify some of the basic Internet resources or facilities such as computers or protocols. Examples of such identifiers are domain names, Internet protocol addresses, and autonomous system numbers, and protocol port and parameter numbers.
Common Protocol
Like common global identifiers, common protocols mean different parts of the network can talk to each other. They do this by creating a set of identifiable rules, or protocols, that all ends of the network will recognise. Once both sides have recognized and agreed to the protocol, they are free to share data.
Content Delivery Networks (CDNs)
A geographically distributed network of proxy servers and their data centers. The goal is to provide high availability and performance by distributing the service spatially relative to end users.
Data Sovereignty
No agreed definition, but in general it means data from a particular country is subject to the laws of the country in which it is collected. Data may mean data related to citizens of a country, or data related to an organization registered in a country, etc.
Deep Packet Inspection
A type of data processing that looks in detail at the contents of data being sent on the Internet. Governments and enterprises often use it to reroute or block content.
Digital Subscriber Line (DSL)
The technology that allows data to be transferred over voice telephone lines.
Distributed Denial of Service (DDoS)
A malicious attempt to disrupt normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic.
Domain Name Registrars
Resellers mediating registration of a domain name for a user/registrant, such as “example.com”. Sometimes their services include providing DNS services for this domain, or even setting a website.
Domain Name Registries
A domain name registry administers data for top level domains (i.e. .com, .org etc)
Domain Name System (DNS)
Aa system that translated domain names to other records, with IP addresses being the most common.
Dynamic Host Configuration Protocol (DHCP)
A protocol that dynamically assigns an IP address and other network configuration parameters to each device on the network, so they can communicate with other IP networks.
Ethernet
A technology commonly used in local area networks that allows connected devices to communicate over a shared media.
General-purpose Network
A network that is general-purpose does not discriminate datagrams based on the payload – the actual content. The Internet is an example of one. It can be adapted for a wide range of services, including voice, streaming video, or sending emails.
Global System for Mobile Communications (GSM)
A second generation (2G) standard for mobile networks.
Intermediary Liability
Intermediary liability protections mean that the intermediary (an Internet service provider or platform) cannot be held legally responsible for data and messages it carries, in the same way a postal worker cannot be held responsible for the content of a letter, or a phone company cannot be held responsible for the subject of a phone call.
Internet Engineering Task Force (IETF)
The premier Internet standards body, developing open standards through open processes.
Internet Exchange Points (IXPs)
A physical and usually neutral location where different IP networks meet to exchange local traffic via a switch.
Internet Protocol (IP)
The basis of the Internet, allowing data in “packets” to be transferred between devices on the network, each of which has a designated IP address which other devices can recognise.
Internet Protocol Security (IPsec)
Describes how the Internet establishes secure connections between devices. It means that devices can authenticate and encrypt data passing between them, and ensures confidentiality and integrity on a connection.
Internet Protocol version 4 (IPv4)
The primary version of IP used on the Internet today is Internet Protocol Version 4 (IPv4). Due to size constraints with the total number of possible addresses in IPv4, a successor protocol, IPv6, was developed.
Internet Protocol version 6 (IPv6)
The newer protocol is called IPv6 and it makes many more addresses available and is increasing in adoption.
Internet Service Provider (ISP)
A company that provides Internet services, including personal and business access to the Internet.
Internet Traffic-peering
A reciprocal method by which Internet networks exchange traffic.
Interoperablity
The ability for a system from one manufacturer to work with one from another.
Network Operators
A generic name for organizations that provide Internet connectivity, ensuring that traffic passes through their network to the correct destination. Types of network operators include broadband access providers (often called ISPs), mobile operators, transit network providers, etc.
Network Topology
The physical and logical relationship of nodes (connection points) in a network.
Node
A connection point for data transmissions on a communications network.
Open Architecture
The principle that an application should be built in such a way that any individual will be able to alter and modify it for different purposes.
Packet-switched Interface
Describes the method by which data is grouped into “packets” that are handled independently by a network based on the metadata containing in each packet, such as a destination IP address.
Permisionless Innovation
An important principle of the Internet. It means that anyone, with their own initiative, can build and create new technologies that will use the Internet without needing authorisation.
Regional Internet Registry (RIR)
Coordinates allocation of the Internet Number Resources, such as IP addresses and AS numbers in the respective region.
Routing
The process of selecting a path across one or more networks so data can travel from one place to another, i.e. from a website server to your device.
TLS Protocol (TLS)
A protocol that created an encrypted channel between two applications. It primarily enables secure Web browsing, applications access, data transfer and most Internet-based communication.
Traffic Engineering
A set of techniques that describes how networks are analyzed and optimized to maximize performance and speed.
Transmission Control Protocol (TCP)
A transport protocol, operating on top of the IP, ensuring reliable data exchange between two applications.
Uniform Resource Locator (URL)
The address of a specific webpage or file on the Internet.
Unrestricted Access
The principle that anyone accessing the Internet should be able to do so freely and connect with any part of the network they choose.
Wireless LAN (WLAN)
A network that allows devices to connect and communicate wirelessly.