98
RAM
Random Access Memory. A group of memory locations that are numerically identified to allow
high speed access by a CPU. In random access, any memory location can be accessed at any
time by referring to its numerical identifier as compared to sequential access, where memory
location 6 can only be accessed after accessing memory locations 1-5.
Reboot
A user activity where the user starts a computing device without interrupting its source of
electrical power.
Router
A device that determines the next network point to which a packet should be forwarded to on
its way to its final destination. A router creates and/or maintains a special routing table that
stores information on how best to reach certain destinations. A router is sometimes included
as part of a network Switch.
Server
In general, a server is a computer program that provides services to other computer programs
within the same or other computers. A computer running a server program is also frequently
referred to as a server. In practice, the server may contain any number of server and client
programs. A web server is the computer program that supplies the requested HTML pages or
files to the client (browser).
SHA
A Secure Hash Algorithm produces a 160-bit (20-byte) hash value typically rendered as a
hexadecimal number, 40 digits long.
Static IP
An IP address that is unchanging. It is more reliable when dealing with VoIP, online gaming,
and VPNs.
SSID
A Service Set Identifier is a set consisting of all the devices associated with a WLAN.
Subnet Mask
A representation of a user’s Internet address where all of the bit positions corresponding to
the user’s network and subnetwork id are 1’s and the bit corresponding to the user’s host id
are 0’s.
Throughput
Rate of information arriving at, and possibly passing through, a particular point in a network
system.
Time-Out
Event that occurs when one network device expects to hear from another network device
within a specified period of time, but does not. The resulting time-out usually results in a re
-
transmission of information or the dissolving of the session between the two devices.
TKIP
Temporal Key Integrity Protocol is a stopgap security protocol used in IEEE 802.11 wireless
networking standards used to replace WEP.
UID
A Unique Identifier is a unique reference number used as an identifier.
Upload
The activity of transferring a file from a user’s computer system to a remote system.
UPnP
Universal Plug n Play is a protocol that permits networked devices to seamlessly discover
each other’s presence on the network.
Summary of Contents for Neutron Series
Page 5: ...5 Chapter 1 Product Overview ...
Page 19: ...19 Chapter 2 Connecting Your Access Point ...
Page 37: ...37 Chapter 3 Configuration ...
Page 40: ...40 3 If successful you will be logged in and see the EWS AP User Interface Menu ...
Page 41: ...41 Chapter 4 Overview ...
Page 45: ...45 Chapter 5 Network ...
Page 50: ...50 Chapter 6 Wireless ...
Page 68: ...68 Chapter 7 Management ...
Page 85: ...85 Chapter 8 Maintenance ...
Page 93: ...93 Glossary ...
Page 100: ...100 Appendix ...