Siemens Gigaset USB Stick 108 Manual page 43

Hide thumbs Also See for Gigaset USB Stick 108:
Table of Contents

Advertisement

Glossary
Subnet mask
The subnet mask determines how many parts of the IP address of a PC represent the
network address and how many parts represent the PC address.
The subnet mask in a network administered by a Router, such as the Gigaset SE551
WLAN dsl/cable, is always 255.255.255.0. That means the first three parts of the
IP address form the network address and the final part is used for assigning the PC
addresses. The first three parts of the IP addresses of all network components are in
this case always the same.
Switch
A Switch, like a Hub, is an element for linking different network segments or
components. Unlike a Hub, however, the Switch has its own intelligence that enables it
to forward packets to only that subnet or network component they are meant for.
See also Bridge, Gateway, Hub, Router
TKIP
Temporal Key Integrity Protocol
TKIP is a further development of WEP encryption. Like WEP, TKIP encryption is based on
the RC4 encryption algorithm. TKIP, however, generates new keys after every 10-Kbyte
packet, thus meeting higher security requirements.
UDP
User Datagram Protocol
UDP is a protocol of the TCP/IP protocol family that handles data transport between two
communication partners (applications). Unlike TCP, UDP is a non-session based
protocol. It does not establish a fixed connection. The data packets, called datagrams,
are sent as a broadcast. The recipient is responsible for making sure the data is received.
The sender is not notified about whether it is received or not.
WAN
Wide Area Network
A WAN is a network that is not restricted to one particular area, such as the LAN.
The Internet is the most frequently used WAN. A WAN is run by one or more public
providers to enable private access. You access the Internet via an Internet provider.
WEP
Wired Equivalent Privacy
WEP is a security protocol defined in the IEEE 802.11 standard. In a WLAN, WEP
encryption protects data against unauthorised access. WEP encryption uses the RC4
encryption algorithm.
Wireless network
See WLAN
42

Advertisement

Table of Contents
loading

Table of Contents