Page 116 / 122 Scroll up to view Page 111 - 115
MBR L13
User’s
Guide
116
NAT
Acronym for
network address translation
. The process of converting between IP addresses used within a private
network and Internet IP addresses. NAT enables all of the computers on a network to share one IP address.
Network
A collection of two or more computers that are connected to each other through wired or wireless means.
These computers can share access to the Internet and the use of files, printers, and other equipment.
Network adapter
Also known as a
network interface card
(NIC). An expansion card or other device used to provide
network access to a computer, printer, or other device.
Network name
The single name of a grouping of computers that are linked together to form a network.
Network printer
A printer that is not connected directly to a computer, but is instead connected directly to a network
through a wired or wireless connection.
Packet
A unit of information transmitted as a whole from one device to another on a network.
PAP
Password Authentication Protocol, the most basic form of authentication, in which a user’s name
and password
are transmitted over a network and compared to a table of name-password pairs. Typically, the passwords stored in
the table are encrypted. The Basic Authentication feature built into the HTTP protocol uses PAP.
PC Card
A peripheral device that adds memory, mass storage, modem capability, or other networking services to
portable computers.
PCI
Acronym for
Peripheral Component Interconnect
. A specific bus type designed to be used with devices that have
high bandwidth requirements.
PCI card
A card designed to fit into a PCI expansion slot in a personal computer. PCI cards provide additional
functionality; for example, two types of PCI cards are video adapters and network interface cards. See PCI.
PCI expansion slot
A connection socket designed to accommodate PCI cards.
PCMCIA
Acronym for
Personal Computer Memory Card International Association
. A nonprofit organization of
manufacturers and vendors formed to promote a common technical standard for PC Card-based peripherals and the
slot designed to hold them, primarily on portable computers and intelligent electronic devices.
Peer-to-peer network
A network of two or more computers that communicate without using a central server. This
lack of reliance on a server differentiates a peer-to-peer network from a client/server network.
PING
A protocol for testing whether a particular computer is connected to the Internet by sending a packet to the
computers IP address and waiting for a response.
Plug and Play
A set of specifications that allows a computer to automatically detect and configure various peripheral
devices, such as monitors, modems, and printers.
Port
A physical connection through which data is transferred between a computer and other devices (such as a
monitor, modem, or printer), a network, or another computer. Also, a software channel for network communications.
PPPoE
Acronym for
Point-to-Point Protocol over Ethernet
. A specification for connecting users on an Ethernet network
to the Internet by using a broadband connection (typically through a DSL modem).
PPTP
Point-to-Point Tunneling Protocol, a technology for creating Virtual Private Networks (VPNs). Because the
Internet is essentially an open network, the Point-to-Point Tunneling Protocol (PPTP) is used to ensure that messages
transmitted from one VPN node to another are secure. With PPTP, users can dial in to their corporate network via the
Internet.
PPTP
IP Security, a set of protocols developed to support secure exchange of packets at the IP layer. IPsec has been
deployed widely to implement Virtual Private Networks (VPNs).
Profile
A computer-
based record that contains an individual network’s software settings and identification
information.
Protocol
A set of rules that computers use to communicate with each other over a network.
Page 117 / 122
MBR L13
User’s
Guide
117
Resource
Any type of hardware (such as a modem or printer) or software (such as an application, file, or game) that
users can share on a network.
Restore factory defaults
The term used to describe the process of erasing your base stations current settings to
restore factory settings. You accomplish this by pressing the Reset button and holding it for five or more seconds.
Note that this is different from resetting the base station.
RJ-11 MBRr
An attachment used to join a telephone line to a device such as a modem or the external telephone lines.
RJ-45 MBRr
An attachment found on the ends of all Ethernet cables that connects Ethernet (wired) cables to other
devices and computers
Server
A computer that provides shared resources, such as storage space or processing power, to network users.
Shared folder
A folder (on a computer) that has been made available for other people to use on a network.
Shared printer
A printer (connected to a computer) that has been made available for other people to use on a
network.
Sharing
To make the resources associated with one computer available to users of other computers on a network.
SNTP
Acronym for
Simple Network Time Protocol
. A protocol that enables client computers to synchronize their clocks
with a time server over the Internet.
SSID
Acronym for
Service Set Identifier
, also known as a "wireless network name." An SSID value uniquely identifies
your network and is case sensitive.
Static IP address
A permanent Internet address of a computer (assigned by an ISP).
Straight-through cable
A type of cable that facilitates network communications. There are two types of Ethernet
cables: the twisted pair and coax Ethernet cables. Each of these allow data to travel at 10Mbit per second. Unlike the
Crossover cable, straight-through cable has the same order of pin contacts on each end-plug of the cable.
Subnet
A distinct network that forms part of a larger computer network. Subnets are connected through routers and
can use a shared network address to connect to the Internet.
Subnet mask
Typically, a subnet may represent all the machines at one geographic location, in one building, or on the
same local area network (LAN). Having an organization’s network to be divided into subnets, allows it to be connected
to the Internet with a single shared network address. This is similar in form to an IP address and typically provided by
an ISP. An example of a subnet mask value is 255.255.0.0.
Switch
A central device that functions similarly to a hub, forwarding packets to specific ports rather than broadcasting
every packet to every port. A switch is more efficient when used on a high-volume network.
Switched network
A communications network that uses switching to establish a connection between parties.
Switching
A communications method that uses temporary rather than permanent connections to establish a link or to
route information between two parties. In computer networks, message switching and packet switching allow any two
parties to exchange information. Messages are routed (switched) through intermediary stations that together serve to
connect the sender and the receiver.
TCP/IP
Acronym for
Transmission Control Protocol/Internet Protocol
. A networking protocol that allows computers to
communicate across interconnected networks and the Internet. Every computer on the Internet communicates by
using TCP/IP.
Throughput
The data transfer rate of a network, measured as the number of kilobytes per second transmitted.
USB
Acronym for
Universal Serial Bus
. USB (Universal Serial Bus) is a plug-and-play interface between a computer and
add-on devices (such as audio players, joysticks, keyboards, telephones, scanners, and printers). With USB, a new
device can be added to your computer without having to add an adapter card or even having to turn the computer off.
USB adapter
A device that connects to a USB port.
Page 118 / 122
MBR L13
User’s
Guide
118
USB MBRr
The plug end of the USB cable that is connected to a USB port. It is about half an inch wide, rectangular and
somewhat flat.
USB port
A rectangular slot in a computer into which a USB MBRr is inserted.
UTP
Acronym for
Unshielded Twisted Pair
. A cable that contains one or more twisted pairs of wires without additional
shielding. It is more flexible and takes less space than a shielded twisted pair (STP) cable, but has less bandwidth.
Virtual server
One of multiple Web sites running on the same server, each with a unique domain name and IP
address.
VPN
A Virtual Private Network (VPN) is a private Network that makes use of the public telecommunication
infrastructure, maintaining privacy through the use of a tunneling Protocol and security procedures.
WAN
Acronym for
Wide Area Network
. A geographically widespread network that might include many linked local
area networks.
Wi-Fi
A term commonly used to mean the wireless 802.11b standard.
Wireless
Refers to technology that connects computers without the use of wires and cables. Wireless devices use
radio transmission to connect computers on a network to one another. Radio signals can be transmitted through
walls, ceilings, and floors, so you can connect computers that are in different rooms in the house without physically
attaching them to one another.
Wireless access point
A device that exchanges data between wireless computers or between wireless computers and
wired computers on a network.
Wireless network name
The single name of a grouping of computers that are linked together to form a network.
Wireless security
A wireless network encryption mechanism that helps to protect data transmitted over wireless
networks.
WLAN
Acronym for
Wireless Local Area Network
. A network that exclusively relies on wireless technology for device
connections.
Page 119 / 122
MBR L13
User’s
Guide
119
Open Source List Appendix
Busybox
GNU GENERAL PUBLIC LICENSE Version 2, June 1991
Copyright (C) 1989, 1991 Free Software Foundation, Inc.
59 Temple Place, Suite 330, Boston, MA
02111-1307
USA
Everyone is permitted to copy and distribute verbatim copies of this license
document, but changing it is not allowed.
CRAMFS support
mkcramfs - make a cramfs file system
Copyright (C) 1999-2002 Transmeta Corporation
This program is free software; you can redistribute it andor modify it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2 of the License, or (at your option) any later version.
This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
See theGNU General Public License for more details.You should
have received a copy of the GNU General Public License along with this program; if not, write to the Free Software
Foundation, Inc., 59
Temple Place, Suite 330, Boston, MA
02111-1307
USA
DOS File System
File rgpkgdosfstoolsdosfsckCOPYING:
The license below applies to dosfsck, which is copyrighted by Werner Almesberger <[email protected]> and Roman Hodek
GNU GENERAL PUBLIC LICENSE Version 2, June 1991 Copyright (C) 1989, 1991 Free Software Foundation, Inc.
59 Temple Place, Suite 330, Boston, MA
02111-1307
USA
Everyone is permitted to copy and distribute verbatim copies of this license
document, but changing it is not allowed.
File
rgpkgdosfstoolsmkdosfs COPYING:
The GPL below is copyrighted by the Free Software Foundation, but the instance of code that it refers to (the mkdosfs
utility is copyrighted by me - David Hudson)
----------------------------------------
GNU GENERAL PUBLIC LICENSE Version 2, June 1991
Copyright (C) 1989, 1991 Free Software Foundation, Inc.
59 Temple Place, Suite 330, Boston, MA
02111-1307
USA
Everyone is permitted to copy and distribute verbatim copies of this license
document, but changing it is not allowed.
EXT2 File System
This package, the EXT2 filesystem utilities, are protected by the GNU
Public License, with the following exception ---
If the version string in the file version.h contains the string "pre-", or "WIP" then this package must be distributed in source form only.
You can give a copy of the binary for e2fsck to help a friend recover his or her filesystem, as the need arises.
However, "pre" or "WIP"
indicates that this release is under development, and available for ALPHA testing. So for your protection as much as mine, I'd rather not
have it appear in a some distribution --- especially not a CD-ROM distribution! The most recent officially distributed version can be found
at http:e2fsprogs.sourceforge.net.
If you need to make a distribution,that's the one you should use.
If there is some reason why you'd
like a more recent version that is still in ALPHA testing for your distribution, please contact me ([email protected]), and we can see if we
can't come to an arrangement.
The release schedules for this package are flexible, if you give me enough lead time.
Theodore Ts'o 26-Jul-2000
----------------------------------------------------------------------
GNU GENERAL PUBLIC LICENSE Version 2, June 1991
Copyright (C) 1989, 1991 Free Software Foundation, Inc.
59 Temple Place, Suite 330, Boston, MA
02111-1307
USA
Everyone is permitted to copy and distribute verbatim copies of this license
document, but changing it is not allowed.
FreeSwan IPSec
GNU GENERAL PUBLIC LICENSE Version 2, June 1991
Copyright (C) 1989, 1991 Free Software Foundation, Inc.
59 Temple Place, Suite 330, Boston, MA
02111-1307
USA
Everyone is permitted to copy and distribute verbatim copies of this license
document, but changing it is not allowed.
gdb Debugger
GNU GENERAL PUBLIC LICENSE Version 2, June 1991
Copyright (C) 1989, 1991 Free Software Foundation, Inc.
59 Temple Place, Suite 330, Boston, MA
02111-1307
USA
Everyone is permitted to copy and distribute verbatim copies of this license
document, but changing it is not allowed.
ROM file system
generation utility
Traffic Control Engine
GNU GENERAL PUBLIC LICENSE Version 2, June 1991
Copyright (C) 1989, 1991 Free Software Foundation, Inc.
59 Temple Place, Suite 330, Boston, MA
02111-1307
USA
Everyone is permitted to copy and distribute verbatim copies of this license
document, but changing it is not allowed.
USB
USB Network driver infrastructure
Copyright (C) 2000-2005 by David Brownell
Copyright (C) 2003-2005 David Hollis <[email protected]>
This program is free software; you can redistribute it andor modify it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2 of the License, or (at your option) any later version.
This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
See the GNU General Public License for more details.
You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software
Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA
02111-1307
USA
usa26msg.h
Copyright (C) 1998-2000 InnoSys Incorporated.
All Rights Reserved
This file is available under a BSD-style copyright
Keyspan USB Async Message Formats for the USA28X
Redistribution and use in
source and binary forms, with or without
modification, are permitted provided that the following conditions are
met:
1. Redistributions of source code must retain this licence text
without modification, this list of conditions, and the following
disclaimer.
The following copyright notice must appear immediately at
the beginning of all source files:
Copyright (C) 1998-2000 InnoSys Incorporated.
All Rights Reserved
This file is available under a BSD-style copyright
2. The name of InnoSys Incorporated may not be used to endorse or promote
products derived from this software without specific prior written
permission.
THIS SOFTWARE IS PROVIDED BY INNOSYS CORP. ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT
NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Page 120 / 122
MBR L13
User’s
Guide
120
usa26msg.h
Copyright (C) 1998-2000 InnoSys Incorporated.
All Rights Reserved
This file is available under a BSD-style copyright
Keyspan USB Async Message Formats for the USA28X
Redistribution and use in
source and binary forms, with or without
modification, are permitted provided that the following conditions are
met:
1. Redistributions of source code must retain this licence text
without modification, this list of conditions, and the following
disclaimer.
The following copyright notice must appear immediately at the beginning of all source files:
Copyright (C) 1998-2000 InnoSys Incorporated.
All Rights Reserved This file is available under a BSD-style copyright
2. The name of InnoSys Incorporated may not be used to endorse or promote
products derived from this software without specific prior written
permission.
THIS SOFTWARE IS PROVIDED BY INNOSYS CORP. ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT
NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
usa49msg.h
Copyright (C) 1998-2000 InnoSys Incorporated.
All Rights Reserved
This file is available under a BSD-style copyright Keyspan USB Async Message Formats for the USA28X
Redistribution and use in
source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain this licence text
without modification, this list of conditions, and the following
disclaimer.
The following copyright notice must appear immediately at
the beginning of all source files:
Copyright (C) 1998-2000 InnoSys Incorporated.
All Rights Reserved. This file is available under a BSD-style copyright
2. The name of InnoSys Incorporated may not be used to endorse or promote products derived from this software without specific prior
written permission.
THIS SOFTWARE IS PROVIDED BY INNOSYS CORP. ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT
NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
usa90msg.h
Copyright (C) 1998-2000 InnoSys Incorporated.
All Rights Reserved
This file is available under a BSD-style copyright Keyspan USB Async Message Formats for the USA28X
Redistribution and use in
source and binary forms, with or without modification, are permitted provided that the following conditions are
met:
1. Redistributions of source code must retain this license text
without modification, this list of conditions, and the following
disclaimer.
The following copyright notice must appear immediately at
the beginning of all source files:
Copyright (C) 1998-2000 InnoSys Incorporated.
All Rights Reserved. This file is available under a BSD-style copyright
2. The name of InnoSys Incorporated may not be used to endorse or promote products derived from this software without specific prior
written permission.
THIS SOFTWARE IS PROVIDED BY INNOSYS CORP. ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT
NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
L2TP Client
LZMA - Compression
Tool
GNU GENERAL PUBLIC LICENSE Version 2, June 1991
Copyright (C) 1989, 1991 Free Software Foundation, Inc.
59 Temple Place, Suite 330, Boston, MA
02111-1307
USA
Everyone is permitted to copy and distribute verbatim copies of this license
document, but changing it is not allowed.
[This is the first released version of the Lesser GPL.
It also counts
as the successor of the GNU Library Public License, version 2, hence
the version number 2.1.]
MD and RAID Tools
Utility
Networking tools
GNU GENERAL PUBLIC LICENSE Version 2, June 1991
Copyright (C) 1989, 1991 Free Software Foundation, Inc.
59 Temple Place, Suite 330, Boston, MA
02111-1307
USA
Everyone is permitted to copy and distribute verbatim copies of this license
document, but changing it is not allowed.
PPPoA server & Client
rgpkgpppkernelbe_pppoa.c
Copyright (C) Jungo LTD 2004
This program is free software; you can redistribute it andor modify it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2 of the License, or (at your option) any later version.
This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
See the GNU General Public License for more details.
You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software
Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02111-1307, USA. netatmpppoatm.c - RFC2364 PPP over ATMAAL5 Copyright
1999-2000 by Mitchell Blank Jr
Based on clip.c; 1995-1999 by Werner Almesberger, EPFL LRCICA
And on ppp_async.c; Copyright 1999 Paul Mackerras
And help from Jens Axboe his program is free software; you can redistribute it andor modify it under the terms of the GNU General Public
License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This driver
provides the encapsulation and framing for sending and receiving PPP frames in ATM AAL5 PDUs.
PPPoE Relay
Linux File Server support
GNU GENERAL PUBLIC LICENSE Version 2, June 1991
Copyright (C) 1989, 1991 Free Software Foundation, Inc.
59 Temple Place, Suite 330, Boston, MA
02111-1307
USA
Everyone is permitted to copy and distribute verbatim copies of this license
document, but changing it is not allowed.
STAR - Archiver Utility
GNU GENERAL PUBLIC LICENSE Version 2, June 1991
Copyright (C) 1989, 1991 Free Software Foundation, Inc.
59 Temple Place, Suite 330, Boston, MA
02111-1307
USA
Everyone is permitted to copy and distribute verbatim copies of this license
document, but changing it is not allowed.

Rate

4 / 5 based on 1 vote.

Popular Ericsson Models

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top