LevelOne AMG-2000 User Manual page 162

Ap management gateway
Hide thumbs Also See for AMG-2000:
Table of Contents

Advertisement

The underlying technology behind the Internet and communications between computers in a network. The first part,
TCP, is the transport part, which matches the size of the messages on either end and guarantees that the correct
message has been received. The IP part is the user's computer address on a network. Every computer in a TCP/IP
network has its own IP address that is either dynamically assigned at startup or permanently assigned. All TCP/IP
messages contain the address of the destination network as well as the address of the destination station. This
enables TCP/IP messages to be transmitted to multiple networks (subnets) within an organization or worldwide.
TFTP
Trivial File Transfer Protocol. A version of the TCP/IP FTP protocol that uses UDP and has no directory or password
capability.
UDP
User Datagram Protocol. A network protocol for transmitting data that does not require acknowledgement from the
recipient of the data that is sent.
Upgrade
To replace existing software or firmware with a newer version.
Upload
To transmit a file over a network.
URL
Uniform Resource Locator. The address of a file located on the Internet.
VoIP
Voice transmission using Internet Protocol to create digital packets distributed over the Internet. VoIP can be less
expensive than voice transmission using standard analog packets over POTS (Plain Old Telephone Service).
VPN
Virtual Private Network. A type of technology designed to increase the security of information transferred over the
Internet. VPN can work with either wired or wireless networks, as well as with dial-up connections over POTS. VPN
creates a private encrypted tunnel from the end user's computer, through the local wireless network, through the
Internet, all the way to the corporate servers and database.
Walled Garden
On the Internet, a walled garden refers to a browsing environment that controls the information and Web sites the
user is able to access. This is a popular method used by ISPs in order to keep the user navigating only specific
areas of the Web, whether for the purpose of shielding users from information -- such as restricting children's access
to pornography -- or directing users to paid content that the ISP supports. America Online is a good example of an
ISP that places users in a walled garden.
159

Advertisement

Table of Contents
loading

Table of Contents