Cradlepoint CTR350 User Manual page 24

Ctr cellular travel router
Hide thumbs Also See for CTR350:
Table of Contents

Advertisement

Carrier Sense Multipl e
Access/ Collision Avoidance
Carrier Sense Multipl e
Access/ Collision Detect
CAT 5
Channel
Client
Collision
Cook ie
Crack er
CSMA/ CA
D
Data
Data Encryption Standard
Data- Link layer
Database
DB- 25
dBd, dBi, dBm
Decrypt
Default
Default Subnet Mask
Demilitarized zone - DMZ
DHCP
DHCP IP Address Range
DHCP Lease Ti me
Digital certificate
CSMA/ CA
CSMA/ CD
Categor y 5. Used f or 10/ 100 Mbps or 1Gbps Etherne t connections
The channel the wireless signal is transmitted on.
A program or user that requests data from a serv er.
When do two d evices on the sa me Ethernet network try and transmit da ta at the e xact same
time.
Information that is store d on th e hard drive of your comput er that hold s your prefer ences to
the site that gav e your comput er the co ok ie.
A talent ed and malicious computer user who gains unauthorized access to a co mputer or
network of computers with the intention of stealing, maliciously modifyi ng, or destroying
information. Also k nown as a "Black Hat Hack er." Often mistak enly refer red to as a Hack er.
Carrier Sense Multipl e Access/ Collision Av oidance C SMA/ CD – Carrier S e nse Multiple
Access/ Collision Detection
Information that has be en translated into binary d o that i t can be proce ssed or move d to
another device
Uses a randomly select ed 56- bit k ey that must b e k now n by both the se nder and the r eceiver
when information is exchanged
The second lay er of the OSI mod el. Controls the mov ement of data on t he physical link of a
network
Organizes information so that it can b e managed updated, as w ell as easily accessed b y users
or applications
A 25 ping male connector for attaching Ex ternal mo dems or R S- 232 serial devices DB- 9 – A 9
pin connector for RS- 232 connections
decibels r elated to dipole antenna, decibels relativ e to isotropic radiato r, decibels relati ve to
one milliwatt
To unscramble an encrypt ed messag e back into plain tex t
A pred etermin ed value or se tting that is used by a program w hen no user input has be en
entered for this value or set ting
The subnet on your router on the local area ne tw ork
A single co mputer or group of comput ers that can be accessed by both users on the Interne t as
well as users on the Local Network , but that is not prot ected by the sa me s ecurity as the Local
Network .
Dynamic Host C onfiguration Protocol. Used to automatically assign I P a ddresses from a
predefined pool of addresses to computers or de vices that r equests the m (S ee Also DH CP IP
Address Range, Number of DHCP Dynamic Clients, Static DH CP Cli ents, DHCP Lease Tim e)
This option defines the range of ad dresses availabl e for the router to as sign to y our internal
network If you have any d evices using S tatic IP addresses, be sure the a ddresses do not fall
with in the range d efined her e.
The amount of tim e a co mputer may have an IP address b efore it is r eq uired to ren ew the l ease.
The lease functions just as the leas e on an apart ment w ould. The initial lease designates the
amount of ti me befor e the lease e xpires. If th e t enant wishes to retain their address when the
lease is expire d then the l ease is established. If the lease is no l onger needed then th e address
is allowed to b e reused by som eone else.
An electronic m ethod of providing credentials t o a s erver in order to have access to it or a
network
23

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents