Funkwerk Bintec R41000 Reference page 472

Bintec r1xxx/r3xxx/r4xxx gateways reference manual
Table of Contents

Advertisement

Glossary
446
nel) with 16 kbps. The two basic channels can be used independ-
ently of each other for each service offered in the T-ISDN. You can
therefore telephone and fax at the same time. T-Com offers the Ba-
sic Rate Interface as a point-to-multipoint or point-to-point connec-
tion.
Blacklist (dialling
You can define a restriction on external dialling for individual sub-
ranges)
scribers. The telephone numbers entered in the blacklist table can-
not be called by the terminals subject to dialling control, e.g. entry
0190 would block all connections to expensive service providers.
Block Cipher Modes
Block-based encryption algorithm
Blowfish
An algorithm developed by Bruce Schneier. It relates to a block
cipher with a block size of 64 bit and a key of variable length (up to
448 bits).
Bluetooth
Bluetooth is a wireless transfer technology that can connect up dif-
ferent devices. Bluetooth replaces cables to connect various devices
e.g. Notebook, PC, PDA, etc. Thanks to Bluetooth, these devices
can exchange data with each other without a fixed connection. For
example, PCs, notebooks or a PDA can access the Internet or a loc-
al network. The appointments on a PDA can be synchronised with
the appointments on the PC without the need for a cable connec-
tion. Because of the many different application areas for the
Bluetooth technology, the different types of connections between the
devices are divided into profiles. A profile determines the service
(function) that the individual Bluetooth clients can use among each
other.
BOD
Bandwidth on Demand
BootP
Bootstrap protocol
Bps
Bits per second. A unit of measure for the transmission rate.
Break-in
In a PBX, the option of breaking in to an existing call. This is sig-
nalled acoustically by an attention tone.
BRI
Basic Rate Interface
Bridge
Network component for connecting homogeneous networks. As op-
posed to a gateway, bridges operate at layer 2 of the OSI model,
are independent of higher-level protocols and transmit data packets
using MAC addresses. Data transmission is transparent, which
means the information contained in the data packets is not inter-
Funkwerk Enterprise Communications GmbH
R1xxx/R3xxx/R4xxx

Advertisement

Table of Contents
loading

Table of Contents