EnGenius Neutron EWS210AP User Manual page 98

Neutron series dual band wireless managed indoor access point
Hide thumbs Also See for Neutron EWS210AP:
Table of Contents

Advertisement

RAM
Reboot
Router
Server
SHA
Static IP
SSID
Subnet Mask
Throughput
Time-Out
TKIP
UID
Upload
UPnP
Random Access Memory. A group of memory locations that are numerically identified to allow
high speed access by a CPU. In random access, any memory location can be accessed at any
time by referring to its numerical identifier as compared to sequential access, where memory
location 6 can only be accessed after accessing memory locations 1-5.
A user activity where the user starts a computing device without interrupting its source of
electrical power.
A device that determines the next network point to which a packet should be forwarded to on
its way to its final destination. A router creates and/or maintains a special routing table that
stores information on how best to reach certain destinations. A router is sometimes included
as part of a network Switch.
In general, a server is a computer program that provides services to other computer programs
within the same or other computers. A computer running a server program is also frequently
referred to as a server. In practice, the server may contain any number of server and client
programs. A web server is the computer program that supplies the requested HTML pages or
files to the client (browser).
A Secure Hash Algorithm produces a 160-bit (20-byte) hash value typically rendered as a
hexadecimal number, 40 digits long.
An IP address that is unchanging. It is more reliable when dealing with VoIP, online gaming,
and VPNs.
A Service Set Identifier is a set consisting of all the devices associated with a WLAN.
A representation of a user's Internet address where all of the bit positions corresponding to
the user's network and subnetwork id are 1's and the bit corresponding to the user's host id
are 0's.
Rate of information arriving at, and possibly passing through, a particular point in a network
system.
Event that occurs when one network device expects to hear from another network device
within a specified period of time, but does not. The resulting time-out usually results in a re-
transmission of information or the dissolving of the session between the two devices.
Temporal Key Integrity Protocol is a stopgap security protocol used in IEEE 802.11 wireless
networking standards used to replace WEP.
A Unique Identifier is a unique reference number used as an identifier.
The activity of transferring a file from a user's computer system to a remote system.
Universal Plug n Play is a protocol that permits networked devices to seamlessly discover
each other's presence on the network.
98

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Neutron ews310apNeutron ews320apNeutron ews360apNeutron seriesEws210apEws310ap ... Show all

Table of Contents