Siemens HiPath C10 User Manual page 282

C10/c100/c1000 ap26 series wireless controller, access points and convergence software, v4.0
Hide thumbs Also See for HiPath C10:
Table of Contents

Advertisement

hwc_glossary.fm
Glossary
Networking terms and abbreviations
Term
SMT (802.11)
SNMP
SNMP trap
SSH
Table 19
282
HiPath Wireless Controller, Access Points and Convergence Software V4.0, C10/C100/C1000 User Guide
Explanation
Station ManagemenT. The object class in the 802.11 MIB that
provides the necessary support at the station to manage the
processes in the station such that the station may work cooperatively
as a part of an IEEE 802.11 network. The four branches of the 802.11
MIB are:
dot11smt - objects related to station management and local
configuration
dot11mac - objects that report/configure on the status of various
MAC parameters
dot11res - Objects that describe available resources
dot11phy - Objects that report on various physical items.
Simple Network Management Protocol. A set of protocols for
managing complex networks. SNMP works by sending messages,
called protocol data units (PDUs), to different parts of a network.
SNMP-compliant devices, called agents, store data about themselves
in Management Information Bases (MIBs) and return this data to the
SNMP requesters.
SNMP includes a limited set of management commands and
responses. The management system issues Get, GetNext and Set
messages to retrieve single or multiple object variables or to establish
the value of a single variable. The managed agent sends a Response
message to complete the Get, GetNext or Set.
An event notification sent by the SNMP managed agent to the
management system to identify the occurrence of conditions (such as
a threshold that exceeds a predetermined value).
Secure Shell, sometimes known as Secure Socket Shell, is a
Unix-based command interface and protocol for securely getting
access to a remote computer. SSH is a suite of three utilities - slogin,
ssh, and scp - secure versions of the earlier UNIX utilities, rlogin, rsh,
and rcp. With SSH commands, both ends of the client/server
connection are authenticated using a digital certificate, and passwords
are protected by being encrypted.
A31003-W1040-U101-1-7619, July 2006 DRAFT

Advertisement

Table of Contents
loading

Table of Contents