Hitachi WirelessIP 3000 Administrator's Manual page 51

Table of Contents

Advertisement

Chapter 3
Appendix
Glossary
SIP Domain
SSID
Static NAT(SNAT)
STUN (Simple Traversal of UDP
Through NATs)
Syslog server
TCP
(Transmission Control
Protocol)
TCP/IP
TFTP Server (Trivial File Transfer
Protocol)
UPnP (Universal Plug and Play)
Web Server
Web Browser
ciphering
Subnet Mask
Server
Signal (dBm)
Jitter Buffer
Certificate
Channel
Default Gateway
Beacon Interval
Firmware
This is the domain for offering services to the SIP user.
This is the ID used in wireless LAN communications for identifying the network.
This is the static NAT table settings. Refer to the NAT-Traversal column with regard to NAT.
Protocol used for traversing NAT using UDP. The traversing of NAT by UDP packets is realized
through examining the router's mapping algorithm and the port number mapped to the external
address of the NAT router.
Server that collects system logs.
This is the standard protocol used in internet. It bridges the IP of network layer and the protocols
(HTTP, FTP, SMTP, POP, etc) above the session layer.
This is the standard protocol used in the internet and intranets.
This is the simple protocol for transporting files between computers connected to the network.
It is characterized by having no authentication function and allowing easy usage.
It can be used for updating the settings file and firmware of WirelessIP 3000.
Technical specifications for enabling mutual recognition of devices connected to a network such as
PC or peripheral devices. It was advocated by Microsoft® in 1999, and is being standardized by the
Universal Plug and Play Forum. UPnP gathers together technologies such as XML, DHCP, SOAP,
and GENA that are standard to the internet; and has the functionality for auto recognition of devices
connected to a network, mutually exchanging information between devices, and exerting control.
This refers to a computer that offers contents to be browsed through web browser.
This is an application for browsing web pages.
This is the encryption of wireless LAN communications. This WirelessIP 3000 product supports 2
types of encryption methods, which are "WEP" and "WPA-PSK (TKIP)", for wireless LAN
communications.
Within the IP address, this is the numeral that defines which bits are used in network address for
distinguishing networks.
The portion that is outside the network address becomes the host address for identifying the
individual computers within the network.
This is a computer or software that offers data or functionality in own possession to client computers
in a computer network.
Shows the wave strength of wireless LAN.
The jitter size that can be tolerated in fulfilling the required quality of conversation differs according to
the jitter buffer of the receiving device.
The role of the jitter buffer is to store the arriving VoIP packets in the buffer and adjust the latency in
the arrival times of packets prior to sending to end user.
If the jitter buffer is made bigger the jitter certainly becomes less, but if the size is made too big
intolerable delays in conversation are forced onto the end users.
This is the data for authenticating the authenticity of the public key used for analyzing digital
signatures. Although it is not possible, by the digital signature itself, to confirm whether the public key
belongs to the person; based on the digital certificate belonging to the digital signature, it is possible
via the certification authority to certify the creator of data as well as there being no tampering of data
(this function can be realized by the digital signature itself).
Wireless LAN uses electromagnetic waves with frequencies in the 2.4 GHz band. The bandwidth is
2.400 to 2.497 GHz, and that range is used divided into 14 channels.
This refers to device such as computer or router that represents the "entrance and exit" used when
accessing computers outside the LAN.
With regard to the IP address of an access location, if a specific gateway is not specified, data is sent
to the host specified in the default gateway.
A Beacon is the packet sent at fixed intervals for the synchronization of wireless LAN
communications. The beacon interval is the period of that fixed interval.
This is the software incorporated into the device for the basic management of the hardware.
- 3-3 -

Advertisement

Table of Contents
loading

Table of Contents