TITLE

Domain of Interpretation

PUB. DATE
March 2007
SOURCE
Network Dictionary;2007, p159
SOURCE TYPE
Book
DOC. TYPE
Reference Entry
ABSTRACT
An encyclopedia entry for "Domain of Interpretation (DOI)" is presented. In Internet Protocol (IP) security, DOI is used to define payload formats, exchange types, and conventions for naming security-relevant information. Such information may include security policies or cryptographic algorithms and modes. This term is also used in Internet Security Association and Key Management Protocol (ISAKMP) and Internet Key Exchange (IKE)
ACCESSION #
31665650

 

Related Articles

  • Network-Level Extended Security Option.  // Network Dictionary;2007, p340 

    A definition of the term "Network-Level Extended Security Option" (NLESO) is presented. It is one of the two kinds of extended Internet Protocol (IP) Security Option fields defined by the DNSIX 2.1 specification, also known as the Department of Defense Intelligence Information System Network...

  • Managing security weaknesses no easy task. Messmer, Ellen // Network World;12/12/2005, Vol. 22 Issue 49, p24 

    The article presents guidelines for managing computer network weaknesses. There are two ways to look for network weaknesses, the agent-based scanner and the agentless scanner. An agent-based scanner is deployed directly on a host system, while an agentless scanner probes machines at targeted IP...

  • Thoughts from NGN 2005.  // Business Communications Review;Nov2005, Vol. 35 Issue 11, p2 

    This article presents the author's views on the networking industry as gathered from the Next Generation Networks conference. He points out three concerns, referring to Internet Protocol Television (IPTV), role of networks in delivering just about everything that the society values, and control...

  • Explicit Path.  // Network Dictionary;2007, p185 

    A definition of the term "Explicit Path" is presented. It refers to a pre-defined route that will be traveled on by a message from a sender to the receiver. It is called Internet protocol (IP) Explicit Path when it occurs in an IP-based network.

  • Trash2.  // Network Dictionary;2007, p495 

    A dictionary entry for the term "Trash2" is presented. The term refers to a denial of service (DoS) exploit that uses Internet Control Message Protocol (ICMP) packets to hang or crash targeted systems.

  • Telco systems to tap NGN growth via Singapore HQ. Tan, Raymond // Telecom Asia;Oct2006, Vol. 17 Issue 10, p14 

    The article reports on the move of Telco Systems Inc. to tap the growth of next generation networks (NGN). Telco Systems is a provider of carrier-class transport and access solutions for Internet protocol (IP) and NGN networks. The company believes that customers in Asia migrating to IP networks...

  • Video over IP. Gilmer, Brad // Broadcast Engineering;Sep2007, Vol. 49 Issue 9, p28 

    The article presents information on transmission of compressed digital video over a packetized network, known as Internet Protocol (IP) transmission. It involves different steps including video compression, forward error correction of the compressed data, encapsulation, and then transmission. At...

  • A flow monitor with deployment strategy based on Traffic Matrix estimation. Jianyong Zhang; Xiaojin Zhu; Zhuo Chen; Haijiao Hou // Applied Mechanics & Materials;2014, Issue 685, p676 

    Deployment of passive monitoring for IP flows in IP network is a prevailing research in last decade, the primary goal of monitor deployment strategy is to maximize the fraction of monitored flows while minimize the cost induced by the monitoring work. Previous researches often get global traffic...

  • Burst.  // Network Dictionary;2007, p78 

    An encyclopedia entry for the data communications term "burst" is presented. It refers to a continuous transfer of data without interruption from one device to another. An example is given, wherein an Internet Protocol traffic headed in the same general direction is assembled and routed as a...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics