Page 116 / 117 Scroll up to view Page 111 - 115
15xx-A1 Family Router Users Guide
116
suite of protocols.
Telnet
An interactive, character-based program used to access a remote
computer. While HTTP (the web protocol) and FTP only allow you to
download files from a remote computer, Telnet allows you to log into and
use a computer from a remote location.
TFTP
Trivial File Transfer Protocol
A protocol for file transfers, TFTP is easier to use than File Transfer
Protocol (FTP) but not as capable or secure.
TKIP
Temporal Key Integrity Protocol (TKIP) provides WPA with a data
encryption function. It ensures that a unique master key is generated for
each packet, supports message integrity and sequencing rules and
supports re-keying mechanisms.
Triggers
Triggers are used to deal with application protocols that create separate
sessions. Some applications, such as NetMeeting, open secondary
connections during normal operations, for example, a connection to a
server is established using one port, but data transfers are performed on
a separate connection. A trigger tells the device to expect these
secondary sessions and how to handle them.
Once you set a trigger, the embedded IP address of each incoming
packet is replaced by the correct host address so that NAT can translate
packets to the correct destination. You can specify whether you want to
carry out address replacement, and if so, whether to replace addresses
on TCP packets only, UDP packets only, or both.
Twisted pair
The ordinary copper telephone wiring used by telephone companies. It
contains one or more wire pairs twisted together to reduce inductance and
noise. Each telephone line uses one pair. In homes, it is most often
installed with two pairs. For Ethernet LANs, a higher grade called
Category 3 (CAT 3) is used for 10BASE-T networks, and an even higher
grade called Category 5 (CAT 5) is used for 100BASE-T networks. See
10BASE-T, 100BASE-T, Ethernet.
Unnumbered interfaces
An unnumbered interface is an IP interface that does not have a local
subnet associated with it. Instead, it uses a router-id that serves as the
source and destination address of packets sent to and from the router.
Unlike the IP address of a normal interface, the router-id of an
unnumbered interface is allowed to be the same as the IP address of
another interface. For example, the WAN unnumbered interface of your
device uses the same IP address of the LAN interface (192.168.1.1).
The unnumbered interface is temporary
PPP or DHCP will assign a
‗real‘ IP
address automatically.
Upstream
The direction of data transmission from the user to the Internet.
VC
Virtual Circuit
A connection from your DSL router to your ISP.
VCI
Virtual Circuit Identifier
Together with the Virtual Path Identifier (VPI), the VCI uniquely identifies a
VC. Your ISP will tell you the VCI for each VC they provide. See VC.
VDSL
Very High Speed Digital Subscriber Line
It provides faster transmission rate and is capable of supporting high
bandwidth applications like IPTV and bandwidth consumed applications.
Page 117 / 117
15xx-A1 Family Router Users Guide
117
VPI
Virtual Path Identifier
Together with the Virtual Circuit Identifier (VCI), the VPI uniquely identifies
a VC. Your ISP will tell you the VPI for each VC they provide. See VC.
WAN
Wide Area Network
Any network spread over a large geographical area, such as a country or
continent. With respect to the device, WAN refers to the Internet.
Web browser
A software program that uses Hyper-Text Transfer Protocol (HTTP) to
download information from (and upload to) web sites, and displays the
information, which may consist of text, graphic images, audio, or video, to
the user. Web browsers use Hyper-Text Transfer Protocol (HTTP).
Popular web browsers include Netscape Navigator and Microsoft Internet
Explorer. See HTTP, web site, WWW.
Web page
A web site file typically containing text, graphics and hyperlinks (cross-
references) to the other pages on that web site, as well as to pages on
other web sites. When a user accesses a web site, the first page that is
displayed is called the home page. See hyperlink, web site.
Web site
A computer on the Internet that distributes information to (and gets
information from) remote users through web browsers. A web site typically
consists of web pages that contain text, graphics, and hyperlinks. See
hyperlink, web page.
WEP
Wired Equivalent Privacy (WEP) encrypts data over WLANs. Data is
encrypted into blocks of either 64 bits length or 128 bits length. The
encrypted data can only be sent and received by users with access to a
private network key. Each PC on your wireless network must be manually
configured with the same key as your device in order to allow wireless
encrypted data transmissions. Eavesdroppers cannot access your
network if they do not know your private key. WEP is considered to be a
low security option.
Wireless
Wireless is a term used to describe telecommunications in which
electromagnetic waves (rather than some form of wire) carry the signal
over part or the entire communication path. See wireless LAN.
Wireless LAN
A wireless LAN (WLAN) is one in which a mobile user can connect to a
local area network (LAN) through a wireless (radio) connection. A
standard, IEEE 802.11, specifies the technologies for wireless LANs.
WPA
Wi-Fi Protected Access
WPA is an initiative by the IEEE and Wi-Fi Alliance to address the security
limitations of WEP. WPA provides a stronger data encryption method
(called Temporal Key Integrity Protocol (TKIP)). It runs in a special, easy-
to-set-up home mode called Pre-Shared Key (PSK) that allows you to
manually enter a pass phrase on all the devices in your wireless network.
WPA data encryption is based on a WPA master key. The master key is
derived from the pass phrase and the network name (SSID) of the device.
It provides improved data encryption and stronger user authentication.
The mode of WPA supported on your device is called Pre-Shared Key
(PSK), which allows you to manually enter a type of key called a pass
phrase.
WWW
World Wide Web
Also called (the) Web. Collective term for all web sites anywhere in the
world that can be accessed via the Internet.

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top