Page 171 / 178 Scroll up to view Page 166 - 170
Reference Manual for the Double 108 Mbps Wireless Firewall Router WGU624
Glossary
9
M-10153-01
router
A device that forwards data between networks. An IP router forwards data based on IP source and
destination addresses.
SSID
A Service Set Identification is a thirty-two character (maximum) alphanumeric key identifying a wireless
local area network. For the wireless devices in a network to communicate with each other, all devices must
be configured with the same SSID.
This is typically the configuration parameter for a wireless PC card. It corresponds to the ESSID in the
wireless Access Point and to the wireless network name.
See also
Wireless Network Name and ESSID.
Subnet Mask
A mask used to determine what subnet an IP address belongs to. Subnetting enables a network administrator
to further divide an IP address into two or more subnets.
An IP address has two components, the network address and the host address. For example, consider the IP
address 150.215.017.009. Assuming this is part of a Class B network, the first two numbers (150.215)
represent the Class B network address, and the second two numbers (017.009) identify a particular host on
this network.
Subnetting enables the network administrator to further divide the host part of the address into two or more
subnets. In this case, a part of the host address is reserved to identify the particular subnet. This is easier to
see if we show the IP address in binary format. The full address is: 10010110.11010111.00010001.00001001
The Class B network part is: 10010110.11010111
and the host address is 00010001.00001001
If this network is divided into 14 subnets, however, then the first 4 bits of the host address (0001) are
reserved for identifying the subnet.
The subnet mask is the network address plus the bits reserved for identifying the subnetwork. (By
convention, the bits for the network address are all set to 1, though it would also work if the bits were set
exactly as in the network address.) In this case, therefore, the subnet mask would be
11111111.11111111.11110000.00000000. It's called a mask because it can be used to identify the subnet to
which an IP address belongs by performing a bitwise AND operation on the mask and the IP address. The
result is the subnetwork address: Subnet Mask 255.255.240.000
11111111.11111111.11110000.00000000
IP Address 150.215.017.009
10010110.11010111.00010001.00001001
Subnet Address 150.215.016.000
10010110.11010111.00010000.00000000
The subnet address, therefore, is 150.215.016.000.
TCP/IP
The main internetworking protocols used in the Internet. The Internet Protocol (IP) used in conjunction with
the Transfer Control Protocol (TCP) form TCP/IP.
TLS
Short for Transport Layer Security, TLS is a protocol that guarantees privacy and data integrity between
client/server applications communicating over the Internet.
Page 172 / 178
Reference Manual for the Double 108 Mbps Wireless Firewall Router WGU624
10
Glossary
M-10153-01
The TLS protocol is made up of two layers. The TLS Record Protocol ensures that a connection is private by
using symmetric data encryption and ensures that the connection is reliable. The second TLS layer is the
TLS Handshake Protocol, which allows authentication between the server and client and the negotiation of
an encryption algorithm and cryptographic keys before data is transmitted or received. Based on Netscape’s
SSL 3.0, TLS supercedes and is an extension of SSL. TLS and SSL are not interoperable.
Universal Plug and Play
UPnP. A networking architecture that provides compatibility among networking technology. UPnP
compliant routers provide broadband users at home and small businesses with a seamless way to participate
in online games, videoconferencing and other peer-to-peer services.
UTP
Unshielded twisted pair is the cable used by 10BASE-T and 100BASE-Tx Ethernet networks.
VCI
Virtual Channel Identifier. Together with the VPI, defines a Virtual Channel through an ATM network. Used
by ATM switching equipment to route data through the network.
VPI
Virtual Path Identifier. Together with the VCI, defines a Virtual Channel through an ATM network. Used by
ATM switching equipment to route data through the network.
VPN
Virtual Private Network. A method for securely transporting data between two private networks by using a
public network such as the Internet as a connection.
WAN
A long distance link used to extend or connect remotely located local area networks. The Internet is a large
WAN.
WEB Proxy Server
A Web proxy server is a specialized HTTP server that allows clients access to the Internet from behind a
firewall.
The proxy server listens for requests from clients within the firewall and forwards these requests to remote
Internet servers outside the firewall. The proxy server reads responses from the external servers and then
sends them to internal client clients.
WEP
Wired Equivalent Privacy is a data encryption protocol for 802.11b wireless networks.
All wireless nodes and access points on the network are configured with a 64-bit or 128-bit Shared Key for
data encryption.
Page 173 / 178
Reference Manual for the Double 108 Mbps Wireless Firewall Router WGU624
Glossary
11
M-10153-01
wide area network
WAN. A long distance link used to extend or connect remotely located local area networks. The Internet is a
large WAN.
Wi-Fi
A trade name for the 802.11b wireless networking standard, given by the Wireless Ethernet Compatibility
Alliance (WECA, see http://www.wi-fi.net), an industry standards group promoting interoperability among
802.11b devices.
Windows Internet Naming Service
WINS. Windows Internet Naming Service is a server process for resolving Windows-based computer names
to IP addresses.
If a remote network contains a WINS server, your Windows PCs can gather information from that WINS
server about its local hosts. This allows your PCs to browse that remote network using the Windows
Network Neighborhood feature.
WINS
WINS. Windows Internet Naming Service is a server process for resolving Windows-based computer names
to IP addresses.
Wireless Network Name (SSID)
Wireless Network Name (SSID) is the name assigned to a wireless network. This is the same as the SSID or
ESSID configuration parameter.
Page 174 / 178
Reference Manual for the Double 108 Mbps Wireless Firewall Router WGU624
12
Glossary
M-10153-01
Page 175 / 178
Index
1
Numerics
64 or 128 bit WEP
4-11
802.11b
D-1
A
Account Name
3-10, 6-2
Address Resolution Protocol
B-9
ad-hoc mode
D-2
Authentication Server
3-15
Auto MDI/MDI-X
B-15, G-2
Auto Uplink
2-4, B-15, G-2
B
backup configuration
6-7
Basic Wireless Connectivity
4-14
BSSID
D-2
C
Cabling
B-11
Cat5 cable
3-1, B-12, G-2
configuration
automatic by DHCP
2-5
backup
6-7
erasing
6-8
restore
6-7
router, initial
3-1
content filtering
2-3, 5-1
conventions
typography
1-1
crossover cable
2-4, 8-2, B-14, B-15, G-2
customer support
1-4
D
date and time
8-7
Daylight Savings Time
8-8
Denial of Service (DoS) protection
2-3
denial of service attack
B-11
DHCP
B-10
DHCP Client ID
C-16
DMZ
2-4, 7-3
DMZ Server
7-7
DNS Proxy
2-5
DNS server
C-20
DNS, dynamic
7-12
documentation updates
3-8, 6-6
domain
C-20
Domain Name
3-10
domain name server (DNS)
B-10
DoS attack
B-11
Dynamic DNS
7-12
E
End Port
7-4, 7-6
EnterNet
C-18
erase configuration
6-8
ESSID
4-14, D-2
Ethernet
2-4
Ethernet cable
B-11
F
factory settings, restoring
6-8
firewall features
2-3
Flash memory, for firmware upgrade
2-2
Index

Rate

4.3 / 5 based on 3 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top