Glossary
ACL
An Access Control List is a mechanism for filtering packets at the hardware level. Packets can be
classified by characteristics such as the source or destination MAC, IP address, IP type, or QoS queue.
Once classified, the packets can be forwarded, counted, queued, or dropped.
ad hoc mode
An 802.11 networking framework in which devices or stations communicate directly with each other,
without the use of an AP.
ARP
Address Resolution Protocol is part of the TCP/IP suite used to dynamically associate a device's physical
address (MAC address) with its logical address (IP address). The system broadcasts an ARP request,
containing the IP address, and the device with that IP address sends back its MAC address so that traffic
can be transmitted.
ATM
Asynchronous Transmission Mode is a start/stop transmission in which each character is preceded by a
start signal and followed by one or more stop signals. A variable time interval can exist between
characters. ATM is the preferred technology for the transfer of images.
BSS
Basic Service Set is a wireless topology consisting of one access point connected to a wired network
and a set of wireless devices. Also called an infrastructure network. See also
CHAP
Challenge-Handshake Authentication Protocol is one of the two main authentication protocols used to
verify a user's name and password for PPP Internet connections. CHAP is more secure because it
performs a three-way handshake during the initial link establishment between the home and remote
machines. It can also repeat the authentication anytime after the link has been established.
CoS
Class of Service specifies the service level for the classified traffic type.
DHCP
Dynamic Host Configuration Protocol allows network administrators to centrally manage and automate
the assignment of IP addresses on the corporate network. DHCP sends a new IP address when a
computer is plugged into a different place in the network. The protocol supports static or dynamic IP
addresses and can dynamically reconfigure networks in which there are more computers than there are
available IP addresses.
DoS attack
ISW Series Managed Industrial Ethernet Switch Hardware Installation & User Guide
83