Compex Technologies NP25G 6C Network Router User Manual


 
Page 102
Ping Packet Internet Groper is a utility used to determine whether a
particular network device (IP address) is available online. It works by
sending out a packet to the device and waiting for its response.
PPPoE Point-to-Point Protocol over Ethernet is a method for the
encapsulation of PPP packets over Ethernet frames.
PPTP PPTP stands for Point-to-Point Tunneling Protocol. It is a protocol that
allows authorized users to extend their own networks through private
“tunnels” over the ISP or online service. This kind of interconnection is
known as VPN ( Virtual Private Network)
RJ-45 A connector used for Ethernet devices that holds up to eight wires.
Router A router is a device that interconnects networks.
Subnet Mask Subnet masking is a method of splitting IP networks into subgroups.
TCP Transmission Control Protocol enables two hosts to establish a
connection and exchange streams of data, guaranteeing delivery of
data and that packets will be delivered in the same order in which
they were sent.
Throughput It is the measurable amount of data moved from one place to
another within a given time period.
UDP User Datagram Protocol is a connectionless protocol that, like TCP,
runs on top of IP networks. Unlike TCP/IP, UDP provides a direct way to
send and receive datagrams over an IP network and is used primarily
for broadcasting messages over a network.
URL Uniform Resource Locator is the address that defines the location of a
file on the World Wide Web.
UTP Unshielded Twisted Pair is the most common kind of copper wiring
designed to reduce crosstalk between copper wires.
VPN Virtual Private Network is a secure means to join remote networks
using comprehensive authentication and encryption. They may be
“virtually” joined even across a public network like the Internet by
means of employing IPSec amongst others.
WAN Wide Area Network. It is a communication network that extends over
a large geographical area. For example, the Internet.
WEP Wired Equivalent Privacy is a wireless data privacy encryption
protocol based on a 64-bit or 128-bit shared key algorithm.
WLAN Wireless Local Area Network is a group of computers and associated
devices that communicate with each other wirelessly.
WPA-PSK WPA-PSK is a special mode for home users without authentication
server and yet provides the same strong encryption protection.