Glossary
G-5
SSID or
Service Set
Identifier
A unique identifier that must match for all nodes on a
subnetwork to communicate with each other. It consists of
up to 32 characters (any printable character, including
spaces). If using the space character, it must be enclosed
in quotation marks. It is case-sensitive.
Static
Method
One of the available boot methods. Use static if your
network uses fixed configuration. The IP address remains
the same every time the device connects to the network.
Subnet
A portion of a network that shares a common address
component. On TCP/IP networks, subnets are all devices
with the same prefix. For example, all devices that start
with 192.192.192 are part of the same subnet. Dividing a
network into subnets is useful for both security and
performance reasons.
Subnet Mask
A mask is used to determine what subnet an IP address
belongs to. Companies often have ranges of IP addresses
that can be described by one or more masks. For example,
a mask of 255.255.255.0 allows variation in the last
position only, because the first three positions are fixed.
Telnet
A Terminal Emulation program for TCP/IP networks that
runs on your computer and connects your computer to a
server on the network. You enter commands through the
Telnet program and they run as if you were entering them
directly on the server console.
TCP/IP
A way that two devices can transmit data between each
other. TCP/IP (Transmission Control Protocol/ Internet
Protocol) is generally the standard for transmitting data
over a network.
TKIP (Temporal Key
Integrity Protocol)
Changes the encryption keys regularly and has time limits
before new keys are created. Changing the key
periodically provides additional security.
TLS (Transport
Layer Security)
A cryptographic protocol that uses client-side and server-
side certificates to authenticate users on the Web. It can
dynamically create user-based and session-based keys.
TTLS (Tunneled
Transport Layer
Security)
Provides certificate-based, server-side, mutual
authentication of the client and network through an
encrypted channel (or tunnel). It can dynamically create
user-based and session-based keys.
Transmit Rate
See
Speed
.
Summary of Contents for Monarch 9493 SNP
Page 8: ...vi...
Page 40: ...2 28 System Administrator s Guide...
Page 48: ...3 8 System Administrator s Guide...
Page 76: ...4 28 System Administrator s Guide...
Page 104: ...6 18 System Administrator s Guide...
Page 110: ...A 2 System Administrator s Guide...
Page 119: ......