Page 166 / 180 Scroll up to view Page 161 - 165
166
Glossary
IPv6 addresses are structured differently from IPv4 address-
es. IP addresses can be written in decimal, octal or hexadeci-
mal format.
IP masquerading
IP masquerading is a technique used within IPv4 networks.
With IP masquerading a computer or LAN can be protected
from unauthorized connection requests from the Internet.
Masquerading works by converting the IP addresses used in a
network to one public IP address. From the outside it appears
as if all requests are sent from a single computer.
IP network
A network in which data exchange takes place on the basis of
the Internet Protocol (IP) is called an IP network.
NAS functionality
NAS is short for Network Attached Storage
NAS designates one or more devices that are integrated into a
network to provide storage space.
In connection with the FRITZ!Box, NAS functionality means
that various services for connected USB storage media are
available in the FRITZ!Box so that it easier for you to use your
data and make them available in the local network. It is easy
to exchange documents in the local network via the storage
medium on the FRITZ!Box. The media server makes music, im-
ages and videos in the network available to compatible play-
back devices. Files can also be released for sharing in the In-
ternet, and local memory expanded by adding online storage.
NAT
short for Network Address Translation
NAT is a technique used within IPv4 networks. NAT is used in
routers to replace the address information in data packets
with new address information. A typical application for NAT is
routers that connect local networks with the Internet. In local
networks, every network device has a private IP address,
Page 167 / 180
Glossary
167
while generally there is only one public IP address available
for the Internet. To grant the network devices access to the In-
ternet, the router replaces the private IP address of the send-
er with its own public IP address in all outgoing data packets.
The router saves all necessary information in a table so that
incoming data packets can then be assigned to the correct
network device.
port
So that a single network connection on a computer can be
used by multiple applications to exchange data with remote
sites at the same time, a computer administers what are
known as ports for the IP-based protocols TCP and UDP. Ports
substantiate the point of access for the data packets deliv-
ered via the IP Internet protocol. While the IP address deter-
mines the destination computer quite generally, the port ad-
dresses the communication interface provided by an applica-
tion for a certain communication procedure.
The Internet protocol allots 16 bits for the specification of the
port number. Thus a total of 65,535 different port numbers
can be specified. Ports up to port number 1,024 are reserved
for special system applications and typical Internet applica-
tions. These include, for instance, the port numbers 21 for
FTP (File Transfer Protocol), 25 for SMTP (Simple Mail Transfer
Protocol), 53 for DNS (Domain Name Service) and 80 for HTTP
(Hypertext Transfer Protocol).
Ports are primarily of interest to users for their role in protect-
ing an Internet connection from external attacks. Most fire-
walls offer the possibility of preventing data traffic on certain
ports. This means that certain port numbers can be blocked
to prevent data from being delivered to system services. This
is also a way of preventing any Trojans (malicious applica-
tions opening backdoors on your computer) that may have in-
fected your computer from receiving data on ports it created
as means of accessing your computer for potentially damag-
ing activities. A firewall blocks most of the atypical port num-
bers not required for normal operation of an application and
offers specialized users the opportunity to forward specified
ports.
Page 168 / 180
168
Glossary
port forwarding
With port forwarding it is possible to specify ports that will al-
low all incoming or outgoing data packets to pass through a
router or firewall.
If a computer from the local network offers server services, for
instance, the settings of a router using NAT
(
see glossary
) or
IP masquerading (
see glossary
) must enable or forward the
port used by the server service for access to incoming data
packets and thus keep it open permanently. The private IP ad-
dress of the given computer must be saved as the destination
address for all of the packets arriving at the port.
Typical server applications that require port forwarding are
FTP and Web servers. To allow access to a computer via re-
mote management software like Symantec pcAnywhere or Mi-
crosoft’s Remote Desktop, or even use of a file-sharing pro-
gram like eDonkey, the required ports must be released for
port forwarding. Port forwarding settings for the most impor-
tant application cases are quite simple as long as the set-
tings of the router or the firewall already contain rules with a
corresponding preconfiguration.
private IP address
Private IP addresses are used for computers and other net-
work devices within local IPv4 networks.
Since many local IP networks are not connected to the Inter-
net except via single computers or routers (gateway), certain
address ranges are excluded from the publicly available IP
addresses so that they are available for assignment in local IP
networks. An IP address may only be assigned once within
the local network. A private IP address may exist in any num-
ber of other local networks.
public IP address
A public IP address is an IP address (
see glossary
) valid in the
Internet. Every computer or router participating in the Internet
must have a uniquely assigned public IP address. This ad-
dress is usually negotiated dynamically with the Internet Ser-
Page 169 / 180
Glossary
169
vice Provider when a connection to the Internet is dialed. The
Internet Service Provider assigns the negotiated IP address to
the computer or router for the duration of an Internet session.
remote configuration
TR-069
(
see glossary
)
splitter
DSL splitter
(
see glossary
)
Stick & Surf
Stick & Surf is a technique developed by AVM for the fast,
simple, error-free and secure configuration of radio networks.
This technique allows for the straightforward transmission of
all important parameters of a radio network from the WLAN
base station to any computer that is to be added to the radio
network.
In this process the radio parameters used, including the
WLAN channel, SSID and WLAN standard used, as well as se-
curity parameters like the encryption method and network
key, are transferred almost fully automatically from the WLAN
base station to the computer with the WLAN client that is to
be connected.
subnet mask
The subnet mask indicates which part of an IP address (
see
glossary
) is the network address and which the address of
the computer. The network address defines what is called the
subnet.
subnetwork
A local IP network can consist of one subnetwork or be divid-
ed into multiple subnetworks. The division into subnetworks
is performed when the local IP network is configured. The
subnetworks of a local IP network are also IP networks (
see
glossary
).
Page 170 / 180
170
Glossary
switch
A switch is a device that connects multiple network devices
with each other, for instance through an Ethernet.
In contrast to a hub, a switch can establish direct connections
between the connected devices. This makes it possible to
send data packets directly to specific recipients.
The entire data throughput is at the disposal of every con-
nected device.
TCP/IP
short for Transmission Control Protocol / Internet Protocol
TCP/IP is the “language” of the Internet. TCP/IP is used to re-
fer to a suite of protocols used for data communication over
the Internet. TCP and IP are the network and transport proto-
cols underlying most Internet services, including file transfer
(FTP) and e-mail communication (SMTP). TCP/IP is available
for practically all computer systems. TCP/IP thus offers the
advantage of trouble-free communication between otherwise
incompatible networks and systems.
TR-069
TR-069 is a technical directive that simplifies the automatic
configuration of Internet access devices like the FRITZ!Box.
TR-069 describes the remote configuration of Internet access
devices. In remote configuration the access and account data
are automatically transmitted to the FRITZ!Box by the Internet
provider. These may include the account data for the Internet
connection, Internet telephone numbers and login data for In-
ternet telephony, or both.
The Internet Service Provider saves the data to be transmitted
on what is called an Auto Configuration Server (ACS). When
the FRITZ!Box is connected with the broadband line (for in-
stance, DSL), the data can be transferred automatically from
the ACS to the FRITZ!Box. This relieves the user of the task of
manually setting up the Internet connection and/or Internet
telephone numbers in the FRITZ!Box.

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top