OxyGEN
mini
Office
Administrator’s Guide
Subnet
A subnet is a portion of a network. The subnet is distinguished from the larger
network by a subnet mask that selects some of the computers of the network
and excludes all others. The subnet’s computers remain physically connected to
the rest of the parent network, but they are treated as though they were on a
separate network.
See Network Mask.
Subnet mask
A mask that defines a subnet.
See Network Mask.
Switch
A device that can establish communication channels between end-users.
A
voice circuit switch provides dedicated voice paths to communicating entities;
a store and forward switch shares paths on a statistically multiplexed basis. An
Ethernet switch performs the same operation for Ethernet connections.
Synchronization
The state after the initial negotiation period (training), when two modems have
succeeded in finding a common set of parameters for the establishment of
a communications channel and normal communication over the channel is
possible. Compare with Training.
Syslog
A protocol and the associated service for the control of logging information and
the optional transmission of it over the network.
T.38
A standard defined by the ITU, for the reliable outband transport of fax calls over
IP networks. Compare with Inband.
TCP
See TCP/IP.
TCP/IP
Transmission Control Protocol/Internet Protocol
The basic protocols used on the Internet. TCP is responsible for dividing data
up into packets for delivery and reassembling them at the destination, while IP
is responsible for delivering the packets from source to destination. When TCP
and IP are bundled with higher-level applications such as HTTP, FTP, Telnet, etc.,
TCP/IP refers to this whole suite of protocols.
Telnet
An interactive, character-based program used to access a remote computer.
While HTTP (the web protocol) and FTP only allow you to download files from
a remote computer, Telnet allows you to log into and use a computer from a
remote location. Compare with SSH.
TFTP
Trivial File Transfer Protocol
A protocol for file transfers, TFTP is easier to use than File Transfer Protocol (FTP)
but not as capable or secure.
TKIP
Temporal Key Integrity Protocol
TKIP provides WPA with a data encryption function.
It ensures that a unique
master key is generated for each packet, supports message integrity and
sequencing rules and supports re-keying mechanisms.
Gennet s.a.
231