285
S
SHA
Shaper
SMTP
SNAP
SNMP
SNTP
SSID
SSH
SSM
SHA is an acronym for Secure Hash Algorithm. It designed by the National Security
Agency (NSA) and published by the NIST as a U.S. Federal Information Processing
Standard. Hash algorithms compute a fixed-length digital representation (known as a
message digest) of an input data sequence (the message) of any length.
A shaper can limit the bandwidth of transmitted frames. It is located after the
ingress queues.
SMTP is an acronym for Simple Mail Transfer Protocol. It is a text-based protocol that
uses the Transmission Control Protocol (TCP) and provides a mail service modeled
on the FTP file transfer service. SMTP transfers mail messages between systems and
notifications regarding incoming mail.
The SubNetwork Access Protocol (SNAP) is a mechanism for multiplexing, on
networks using IEEE 802.2 LLC, more protocols than can be distinguished by the 8-
bit 802.2 Service Access Point (SAP) fields. SNAP supports identifying protocols by
Ethernet type field values; it also supports vendor-private protocol identifier.
SNMP is an acronym for Simple Network Management Protocol. It is part of the
Transmission Control Protocol/Internet Protocol (TCP/IP) protocol for network
management. SNMP allow diverse network objects to participate in a network
management architecture. It enables network management systems to learn
network problems by receiving traps or change notices from network devices
implementing SNMP.
SNTP is an acronym for Simple Network Time Protocol, a network protocol for
synchronizing the clocks of computer systems. SNTP uses UDP (datagrams) as
transport layer.
Service Set Identifier is a name used to identify the particular 802.11 wireless LANs
to which a user wants to attach. A client device will receive broadcast messages
from all access points within range advertising their SSIDs, and can choose one to
connect to, based on pre-configuration or by displaying a list of SSIDs in range and
asking the user to select one (Wikipedia).
SSH is an acronym for Secure SHell. It is a network protocol that allows data to be
exchanged using a secure channel between two networked devices. The encryption
used by SSH provides confidentiality and integrity of data over an insecure network.
The goal of SSH was to replace the earlier rlogin, TELNET and rsh protocols, which
did not provide strong authentication or guarantee confidentiality (Wikipedia).
SSM in SyncE; this is an abbreviation for Synchronization Status Message and is
containing a QL indication.