Siemens SCALANCE W1750D UI Configuration Manual page 568

Table of Contents

Advertisement

Appendix
B.3 Glossary
Term
POE
PPPoE
QoS
RF
TACACS
TACACS+
VPN
WEP
wireless
wireless network
568
Definition
Power over Ethernet (PoE) is a method of delivering power on the same
physical Ethernet wire used for data communication. Power for devices is
provided in one of the following two ways:
Endspan— The switch that an AP is connected for power supply.
Midspan— A device can sit between the switch and APs
The choice of endspan or midspan depends on the capabilities of the
switch to which the AP is connected. Typically if a switch is in place and
does not support PoE, midspan power injectors are used.
Point-to-Point Protocol over Ethernet (PPPoE) is a method of connecting to
the Internet typically used with DSL services where the client connects to
the DSL modem.
Quality of Service (QoS) refers to the capability of a network to provide
better service to a specific network traffic over various technologies.
Radio Frequency (RF) refers to the portion of electromagnetic spectrum in
which electromagnetic waves are generated by feeding alternating current
to an antenna.
Family of protocols that handle remote authentication and related services
for network access control through a centralized server.
Derived from TACACS but an entirely new and separate protocol to handle
AAA services. TACACS+ uses TCP and is not compatible with TACACS.
Because it encrypts password, username, authorization, and accounting, it
is less vulnerable than RADIUS.
A Virtual Private Network (VPN) network that uses a public telecommunica-
tion infrastructure, such as the Internet, to provide remote offices or individ-
ual users with secure access to their organization's network. A VPN
ensures privacy through security procedures and tunneling protocols such
as the Layer Two Tunneling Protocol ( L2TP ). Data is encrypted at the
sending end and decrypted at the receiving end.
Wired equivalent privacy (WEP) is a security protocol specified in 802.11b,
designed to provide a WLAN with a level of security and privacy compara-
ble to what is usually expected of a wired LAN. Data encryption protects the
vulnerable wireless link between clients and access points; once this
measure has been taken, other typical LAN security mechanisms such as
password protection, end-to-end encryption,
virtual private networks (VPNs), and authentication can be put in place to
ensure privacy.
Describes telecommunications in which electromagnetic waves (rather than
some form of wire) carry the signal over part or all of the communication
path.
In a Wireless LAN (WLAN), laptops, desktops, PDAs, and other computer
peripherals are connected to each other without any network cables.
These network elements or clients use radio signals to communicate with
each other. Wireless networks are set up based on the IEEE 802.11 stand-
ards.
Configuration Manual, 02/2018, C79000-G8976-C451-02
SCALANCE W1750D UI

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents