Netgear Double 108 Mbps Wireless PC Card WG511U User Manual Page 92

  • Download
  • Add to my manuals
  • Print
  • Page
    / 95
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 91
User’s Manual for the NETGEAR Double 108 Mbps Wireless PC Card 32-bit CardBus WG511U
6 Glossary
August 2004
Routing Information Protocol
RIP. A protocol in which routers periodically exchange information with one another so that they can
determine minimum distance paths between sources and destinations.
router
A device that forwards data between networks. An IP router forwards data based on IP source and
destination addresses.
SSID
A Service Set Identification is a thirty-two character (maximum) alphanumeric key identifying a wireless
local area network. For the wireless devices in a network to communicate with each other, all devices must
be configured with the same SSID. This is typically the configuration parameter for a wireless PC card. It
corresponds to the ESSID in the wireless Access Point and to the wireless network name.
See also Wireless
Network Name and ESSID.
Subnet Mask
A mask used to determine what subnet an IP address belongs to. Subnetting enables a network administrator
to further divide an IP address into two or more subnets.
TCP/IP
The main internetworking protocols used in the Internet. The Internet Protocol (IP) used in conjunction with
the Transfer Control Protocol (TCP) form TCP/IP.
TLS
Short for Transport Layer Security, a protocol that guarantees privacy and data integrity between client/
server applications communicating over the Internet. The TLS protocol is made up of two layers:
The TLS Record Protocol -- layered on top of a reliable transport protocol, such as TCP, it
ensures that the connection is private by using symmetric data encryption and it ensures that
the connection is reliable. The TLS Record Protocol also is used for encapsulation of
higher-level protocols, such as the TLS Handshake Protocol.
The TLS Handshake Protocol -- allows authentication between the server and client and the
negotiation of an encryption algorithm and cryptographic keys before the application protocol
transmits or receives any data.
TLS is application protocol-independent. Higher-level protocols can layer on top of the TLS protocol
transparently. Based on Netscape’s SSL 3.0, TLS supercedes and is an extension of SSL. TLS and SSL are
not interoperable.
WAN
A long distance link used to extend or connect remotely located local area networks. The Internet is a large
WAN.
Page view 91
1 2 ... 87 88 89 90 91 92 93 94 95

Comments to this Manuals

No comments