NETGEAR RP614 Reference Manual page 103

Web safe router
Hide thumbs Also See for RP614:
Table of Contents

Advertisement

Network Address
Translation
packet
PPP
PPP over Ethernet
PPTP
PSTN
Point-to-Point
Protocol
RFC
RIP
router
Routing Information
Protocol
subnet mask
UTP
VPN
WAN
WEP
Glossary
Reference Manual for the Model RP614 Web Safe Router
A technique by which several hosts share a single IP address for access to the
Internet.
A block of information sent over a network. A packet typically contains a
source and destination network address, some protocol and length
information, a block of data, and a checksum.
See Point-to-Point Protocol.
PPPoE. PPP over Ethernet is a protocol for connecting remote hosts to the
Internet over an always-on connection by simulating a dial-up connection.
Point-to-Point Tunneling Protocol. A method for establishing a virtual private
network (VPN) by embedding Microsoft's network protocol into Internet
packets.
Public Switched Telephone Network.
PPP. A protocol allowing a computer using TCP/IP to connect directly to the
Internet.
Request For Comment. Refers to documents published by the Internet
Engineering Task Force (IETF) proposing standard protocols and procedures
for the Internet. RFCs can be found at www.ietf.org.
See Routing Information Protocol.
A device that forwards data between networks. An IP router forwards data
based on IP source and destination addresses.
A protocol in which routers periodically exchange information with one
another so that they can determine minimum distance paths between sources
and destinations.
See netmask.
Unshielded twisted pair. The cable used by 10BASE-T and 100BASE-Tx
Ethernet networks.
Virtual Private Network. A method for securely transporting data between two
private networks by using a public network such as the Internet as a
connection.
See wide area network.
Wired Equivalent Privacy. WEP is a data encryption protocol for 802.11b
wireless networks. All wireless nodes and access points on the network are
configured with a 64-bit or 128-bit Shared Key for data encryption.
3

Advertisement

Table of Contents
loading

Table of Contents