ZyXEL Communications Prestige 100L User Manual page 111

Idsl hub router
Hide thumbs Also See for Prestige 100L:
Table of Contents

Advertisement

Prestige 100L IDSL Router
POP
Port (H/W)
Port
POTS
PPP
Promiscuous
Packet Capture
Protocol
Proxy Server
PSTN
Public Key
Encryption
H
Post Office Protocol. This is a common protocol used for sending, receiving, and
delivering mail messages.
An interface on a computer for connecting peripherals or devices to the computer. A
printer port, for example, is an interface that is designed to have a printer connected
to it. Ports can be defined by specific hardware (such as a keyboard port) or through
software.
An Internet port refers to a number that is part of a URL, appearing after a colon (:)
right after the domain name. Every service on an Internet server listens on a
particular port number on that server. Most services have standard port numbers,
e.g., Web servers normally listen on port 80.
Plain Old Telephone Service is the analog telephone service that runs over copper
twisted-pair wires and is based on the original Bell telephone system. Twisted-pair
wires connect homes and businesses to a neighborhood central office. This is called
the local loop. The central office is connected to other central offices and long-
distance facilities.
Point to Point Protocol. PPP encapsulates and transmits IP (Internet Protocol)
datagrams over serial point-to-point links. PPP works with other protocols such as
IPX (Internetwork Packet Exchange). The protocol is defined in IETF (Internet
Engineering Task Force) RFC 1661 through 1663. PPP provides router-to-router,
host-to-router, and host-to-host connections.
Actively capturing packet information from a network. Most computers only collect
packets specifically addressed to them. Promiscuous packet capture acquires all
network traffic it can regardless of where the packets are addressed.
A "language" for communicating on a network. Protocols are sets of standards or
rules used to define, format, and transmit data across a network. There are many
different protocols used on networks. For example, most web pages are transmitted
using the HTTP protocol.
A server that performs network operations in lieu of other systems on the network.
Proxy Servers are most often used as part of a firewall to mask the identity of users
inside a corporate network yet still provide access to the Internet. When a user
connects to a proxy server, via a web browser or other networked application, he
submits commands to the proxy server. The server then submits those same
commands to the Internet, yet without revealing any information about the system
that originally requested the information. Proxy servers are an ideal way to also have
all users on a corporate network channel through one point for all external
communications. Proxy servers can be configured to block certain kinds of
connections and stop some hacks.
Public Switched Telephone Network was put into place many years ago as a voice
telephone call-switching system. The system transmits voice calls as analog signals
across copper twisted cables from homes and businesses to neighborhood COs
(central offices); this is often called the local loop. The PSTN is a circuit-switched
system, meaning that an end-to-end private circuit is established between caller and
callee.
System of encrypting electronic files using a key pair. The key pair contains a public
key used during encryption, and a corresponding private key used during decryption.
Glossary

Advertisement

Table of Contents
loading

Table of Contents