LWS100A/LWS100AE User’s Manual
67
can be used to identify a particular subnet. The system administrator can further divide the
host address into two or more subnets. A mask is used to determine what subnetwork an IP
address belongs to.
The subnet mask is the network address plus the bits reserved for
identifying the subnetwork.
By convention, the bits for the network address are all set to 1 due
to it will work the same if the bits were set exactly as in the network address. It's called a
mask because it can be used to identify the subnet to which an IP address belongs by
performing a bitwise AND operation on the mask and the IP address.
TCP (Transmission Control Protocol)
A protocol used along with the IP (Internet Protocol) to send data in message units between
network devices over a LAN or WAN. IP takes care of handling the data routing and TCP
takes care of tracking the individual units of data (called packets) that a message is divided
into for efficient delivery over the network. TCP is a connection oriented protocol due to it
requires the receiver to return an acknowledgment of receipting the packet to the sender.
TCP/IP (Transmission Control Protocol/Internet Protocol)
TCP/IP is a suite of communications protocols used to connect hosts on the Internet. It uses
several protocols, the two major protocols are TCP and IP.
UDP (User Datagram Protocol)
A protocol used along with the IP (Internet Protocol) to send data in message units (datagram)
between network devices over a LAN or WAN. IP takes care of handling the data routing and
UDP takes care of tracking the individual units of data (called packets) that a message is
divided into for efficient delivery over the network. UDP is a connectionless protocol due to it
does not require the receiver to return an acknowledgment of receipting the packet to the
sender (as opposed to TCP). UDP connection is not a reliable connection. It is used primarily
for broadcasting messages over a network.
Wired Equivalent Privacy (WEP)
The optional cryptographic confidentiality algorithm specified by IEEE 802.11 used to
provide data confidentiality that is subjectively equivalent to the confidentiality of a wired
local area network (LAN) medium that does not employ cryptographic techniques to enhance
privacy.
WLAN (Wireless Local Area Network)
A group of computers and associated devices that use radio frequency to communicate with
each other
Summary of Contents for LWS100AE
Page 26: ...Figure 3 10 Select Internet Options Figure 3 11 Delete Temporary Internet Files...
Page 40: ...LWS100A LWS100AE User s Manual 40 Figure 5 7 Clear from Virtual Com List...
Page 55: ...LWS100A LWS100AE User s Manual 55 Figure 6 6 Simple Terminal Simulator...
Page 61: ...LWS100A LWS100AE User s Manual 61 8 2 WLAN Figure 8 2 WLAN Default Settings...
Page 68: ...LWS100A LWS100AE User s Manual 68 Copyright 2006 Black Box Corporation All rights reserved...