Page 231 / 237 Scroll up to view Page 226 - 230
OxyGEN
mini
Office
Administrator’s Guide
Subnet
A subnet is a portion of a network. The subnet is distinguished from the larger
network by a subnet mask that selects some of the computers of the network
and excludes all others. The subnet’s computers remain physically connected to
the rest of the parent network, but they are treated as though they were on a
separate network.
See Network Mask.
Subnet mask
A mask that defines a subnet.
See Network Mask.
Switch
A device that can establish communication channels between end-users.
A
voice circuit switch provides dedicated voice paths to communicating entities;
a store and forward switch shares paths on a statistically multiplexed basis. An
Ethernet switch performs the same operation for Ethernet connections.
Synchronization
The state after the initial negotiation period (training), when two modems have
succeeded in finding a common set of parameters for the establishment of
a communications channel and normal communication over the channel is
possible. Compare with Training.
Syslog
A protocol and the associated service for the control of logging information and
the optional transmission of it over the network.
T.38
A standard defined by the ITU, for the reliable outband transport of fax calls over
IP networks. Compare with Inband.
TCP
See TCP/IP.
TCP/IP
Transmission Control Protocol/Internet Protocol
The basic protocols used on the Internet. TCP is responsible for dividing data
up into packets for delivery and reassembling them at the destination, while IP
is responsible for delivering the packets from source to destination. When TCP
and IP are bundled with higher-level applications such as HTTP, FTP, Telnet, etc.,
TCP/IP refers to this whole suite of protocols.
Telnet
An interactive, character-based program used to access a remote computer.
While HTTP (the web protocol) and FTP only allow you to download files from
a remote computer, Telnet allows you to log into and use a computer from a
remote location. Compare with SSH.
TFTP
Trivial File Transfer Protocol
A protocol for file transfers, TFTP is easier to use than File Transfer Protocol (FTP)
but not as capable or secure.
TKIP
Temporal Key Integrity Protocol
TKIP provides WPA with a data encryption function.
It ensures that a unique
master key is generated for each packet, supports message integrity and
sequencing rules and supports re-keying mechanisms.
Gennet s.a.
231
Page 232 / 237
OxyGEN
mini
Office
Administrator’s Guide
TOS
Type of Service
A 1-byte long field in the header of IP packets for the indication of the desired
QoS level. Initially, only 3 bits were used out of the whole byte for the traffic
management purposes (IP Precedence bits) whereas modern models take 6 bits
into account (DSCP).
See DSCP.
TR-069
A technical specification by the DSL Forum for the remote management of CPEs
by a central ACS server.
See ACS Server.
Traceroute
A program, which (like Ping) can be used to verify whether there is IP connectivity
between two networked hosts, but also reveals all the IP routing hops in-between.
Traffic Class
A traffic class is a collection of QoS mechanisms and parameters aiming to
provide a defined level of service to IP packets in the traffic class.
Training
The initial negotiation period, when two modems have succeeded contacting
each other and are negotiating in finding a common set of parameters (e.g.
symbol, data rate) for the establishment of a communications channel. Compare
with Synchronization.
Triggers
Triggers are used to deal with application protocols that create separate sessions.
Some applications, such as NetMeeting, open secondary connections during
normal operations, for example, a connection to a server is established using
one port, but data transfers are performed on a separate connection. A trigger
tells the device to expect these secondary sessions and how to handle them.
Once you set a trigger, the embedded IP address of each incoming packet is
replaced by the correct host address so that NAT can translate packets to the
correct destination.
You can specify whether you want to carry out address
replacement, and if so, whether to replace addresses on TCP packets only, UDP
packets only, or both.
Triple-Play
A term usually used for the description of broadband networks supporting Data,
Voice and Video services at the same time.
Tunnel Brokers
In networking, tunnelling implies enabling new networking functions while still
preserving the underlying network as is. There may be several reasons why a
network needs tunnelling, for example, to carry a payload over an incompatible
delivery network.
IPv6 tunneling enables IPv6 hosts and routers to connect
with other IPv6 hosts and routers over the existing IPv4 Internet.
The main
purpose of IPv6 tunneling is to deploy IPv6 as well as maintain compatibility with
large existing base of IPv4 hosts and routers. IPv6 tunneling encapsulates IPv6
datagrams within IPv4 packets. The encapsulated packets travel across an IPv4
Internet until they reach their destination host or router. The IPv6-aware host or
router decapsulates the IPv6 datagrams, forwarding them as needed.
Gennet s.a.
232
Page 233 / 237
OxyGEN
mini
Office
Administrator’s Guide
Tunneling
Tunneling provides a mechanism to transport packets of one protocol kind within
another protocol. The protocol that is carried is called the passenger protocol,
and the protocol that is used for carrying the passenger protocol is called the
transport protocol. The tunnels behave as virtual point-to-point links that have
two endpoints identified by the tunnel source and tunnel destination addresses
at each endpoint.
Twisted Pair
The ordinary copper telephone wiring used by telephone companies. It contains
one or more wire pairs twisted together to reduce inductance and noise. Each
telephone line uses one pair. In homes, it is most often installed with two pairs.
For Ethernet LANs, a higher grade called Category 3 (CAT 3) is used for 10BASE-T
networks, and an even higher grade called Category 5 (CAT 5) is used for
100BASE-T networks.
See 10BASE-T, 100BASE-T, Ethernet.
UBR
Unspecified Bit Rate
A service category defined by the ATM Forum primarily for data applications.
This service has no guaranteed quality of service associated with it. However,
the QOS for the UBR service is engineered to meet certain (target) objectives.
UDP
User Datagram Protocol
Along with TCP and IP, the three protocols that mainly govern the operation of
the Internet. UDP, like TCP, is responsible for dividing data up into packets for
delivery and reassembling them at the destination.
However, it is considered
an unreliable transmission protocol, since (unlike TCP) it does not guarantee
successful reception of the data through the deployment of a retransmission
mechanism.
See TCP/IP.
ULA
A unique local address (ULA) is an IPv6 address in the block fc00::/7, defined
in RFC 4193. It is the IPv6 equivalent of the IPv4 private address. Unique local
addresses are available for use in private networks, e.g. inside a single site or
organization and are not routable in the global IPv6 Internet.
Unicast
The point-to-point transmission of IP packets.
Contrary to broadcasting and
multicasting, a unicast IP stream is sent to a single final destination. Compare
with Broadcast and Multicast.
Unnumbered Interfaces
An unnumbered interface is an IP interface that does not have a local subnet
associated with it.
Instead, it uses a router-id that serves as the source and
destination address of packets sent to and from the router. Unlike the IP address
of a normal interface, the router-id of an unnumbered interface is allowed to
be the same as the IP address of another interface.
For example, the WAN
unnumbered interface of your device uses the same IP address of the LAN
interface (192.168.1.254).
The unnumbered interface is temporary --- PPP or
DHCP will assign a "real" IP address automatically.
Gennet s.a.
233
Page 234 / 237
OxyGEN
mini
Office
Administrator’s Guide
UPnP
Universal Plug and Play
UPnP is a networking architecture that provides peer-to-peer network connec-
tivity among networking equipment, software and peripherals, particularly within
the home. UPnP builds on Internet standards and technologies, such as TCP/IP,
HTTP, and XML. It defines and publishes UPnP device control protocols, like the
Internet Gateway Device (IGD) used for NAT traversal. One inherent disadvan-
tage of UPnP is that it lacks authentication mechanisms, and usually it is assumed
that local systems and their users are completely trustworthy.
Upstream
The direction of data transmission from the user to the Internet.
URL
Uniform Resource Locator
An address that specifies the location of a file or a service on the Internet (e.g.
).
USB
Universal Serial Bus
A connection port on a computer that is universally compatible with many types
of devices, such as, printers, speakers, mouse, etc. USB 1.1 can support speeds of
up to 12Mbps whereas the newer USB 2.0 can support speeds of up to 480Mbps.
USB Device Port
A term used for referring to Type-B Female USB ports. Peripheral devices (e.g.
printers, USB sticks, etc) usually have a USB device port in order to connect to
PCs.
USB Host Port
A term used for referring to Type-A Female USB ports. A USB host port is used for
connecting peripheral devices (e.g. printers, USB sticks, etc). PCs are equipped
with multiple USB host ports.
Username
A sequence of characters used to uniquely identify a user. Usernames, often in
combination with passwords, are required in multi-user systems allowing the user
to gain access to a computer system or an online service.
V.90 / V.92
International standards for 56K data communications.
VBR
Variable Bit Rate
A service category defined by the ATM Forum for applications and services
which have less stringent cell loss, delay and delay variation requirements than
the applications which use the CBR service.
VC
Virtual Circuit
A point-to-point circuit. Depending on whether they remain constant over time
or are dynamically set-up, VCs in ATM networks are divided into two categories:
Permanent (PVC) and Switched (SVC), with the former being the usual case for
the CPE-to-DSLAM connection in ADSL deployments.
See PVC.
VCI
Virtual Circuit Identifier
Together with the Virtual Path Identifier (VPI), the VCI uniquely identifies a PVC.
Your ISP will tell you the VCI for each PVC they provide.
See PVC.
Gennet s.a.
234
Page 235 / 237
OxyGEN
mini
Office
Administrator’s Guide
VCMux
Virtual Circuit Multiplexing
VCMux is an ATM multiplexing method that allows only one protocol to be
carried per PVC. Note that both ends of the connection must be set to the
same multiplexing method.
If they are not the same, the system will discard
all incoming packets that do not match the configured multiplexing method.
Compare with LLC.
VDSL
Very High Bit-rate Digital Subscriber Line
A DSL technology variation proposed for shorter local loops, which provides 13 -
53Mbps downstream and 1.5 - 2.3Mbps upstream.
VLAN
Virtual Local Access Network
A group of devices on different physical LAN segments which can communicate
with each other as if they were all on the same physical LAN segment.
For
Ethernet networks, VLANs are defined using the 802.1Q standard.
VLAN ID
A 12-bit field specifying the 802.1Q VLAN to which an Ethernet frame belongs.
Valid values are 1 up to 4094.
VLAN ID 1 is often reserved for management
purposes.
See VLAN.
VoIP
See IP Voice.
VPI
Virtual Path Identifier
Together with the Virtual Circuit Identifier (VCI), the VPI uniquely identifies a VC.
Your ISP will tell you the VPI for each VC they provide.
See VC.
VPN
Virtual Private Network
A VPN is a private network that makes use of a public network (such as the
Internet), while maintaining security and privacy through encryption and security
procedures. Common VPN protocols are IPSec, L2TP and SSL.
WAN
Wide Area Network
Any network spread over a large geographical area, such as a country or
continent. With respect to the OxyGEN miniOffice, WAN refers to the Internet.
Compare with LAN.
Web Browser
A software program that uses Hyper-Text Transfer Protocol (HTTP) to download
information from (and upload to) web sites, and displays the information, which
may consist of text, graphic images, audio, or video, to the user. Web browsers
use Hyper-Text Transfer Protocol (HTTP). Popular web browsers include Mozilla
Firefox, Microsoft Internet Explorer, Google Chrome and Apple Safari.
See HTTP, Web Site, WWW.
Web Filtering
The process of selective acceptance in downloading of Web pages. Selection
criteria can be quite complex, ranging from the existence of certain keywords in
the requested URL to the examination of the exact contents of the Web page.
Gennet s.a.
235

Rate

4.5 / 5 based on 2 votes.

Popular Gennet-OxyGEN Models

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top