Siemens Gigaset SE587 WLAN dsl Specifications Page 81

  • Download
  • Add to my manuals
  • Print
  • Page
    / 89
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 80
81
Glossary
Gigaset SE587 WLAN dsl / eng / A31008-N1083-L171-1-7619 / glossary.fm / 12.12.2007
Schablone 2004_08_26
Subnet mask
The subnet mask determines how many parts of IP addresses of a network represent the
network number and how many parts the computer number.
If the subnet mask is in a network that is administered by the Gigaset SE587 WLAN dsl,
for example 255.255.255.0, the first three parts of the IP address form the network
number and only the final part can be used for assigning host numbers. The first three
parts of the IP address of all network components are therefore always the same in this
case.
Switch
A switch, like a Hub, is an element used to link different network segments or compo-
nents. Unlike a hub however, the switch has its own intelligence that enables it to for-
ward packets to only the subnet or network component for which they are intended.
See also: Bridge, Hub, Router, Gateway
TCP
Transmission Control Protocol
The TCP Protocol is part of the TCP/IP protocol family. TCP handles data transport
between communication partners (applications). TCP is a session-based transfer proto-
col, i.e. it sets up, monitors and terminates a connection for transferring data.
See also: UDP
TCP/IP
Protocol family on which the Internet is based. IP forms the basis for every computer-to-
computer connection. TCP provides applications with a reliable transmission link in the
form of a continuous data stream. TCP/IP is the basis on which services such as WWW,
Mail and News are built. There are other protocols as well.
TKIP
Temporal Key Integrity Protocol
TKIP is a security protocol used for data Encryption in wireless networks. It is used for
WPA encryption. It was designed to correct deficiencies in the older Wired Equivalent
Privacy (WEP) standard. For this reason TKIP provides per-packet key mixing, a message
integrity check, and a rekeying mechanism. TKIP ensures that every data packet is sent
with its own unique encryption key.
UDP
User Datagram Protocol
UDP is a Protocol of the TCP/IP protocol family that handles data transport between two
communication partners (applications). Unlike TCP, UDP is a non-session based proto-
col. It does not establish a fixed connection. The recipient is responsible for making sure
the data is received. The sender is not notified about whether it is received or not.
Page view 80
1 2 ... 76 77 78 79 80 81 82 83 84 85 86 87 88 89

Comments to this Manuals

No comments