Wi-Fi Personal Bridge 150
User Manual
219
Subnet
A subnet is a portion of a network. The subnet is distinguished from the larger network by a
subnet mask
that selects some of the computers of the network and excludes all others. The
subnet's computers remain physically connected to the rest of the parent network, but they are
treated as though they were on a separate network. See
network mask
.
Subnet mask
A mask that defines a subnet. See
network mask
.
TCP
See
TCP/IP
.
TCP/IP
Transmission Control Protocol/Internet Protocol
The basic protocols used on the Internet. TCP is responsible for dividing data up into packets
for delivery and reassembling them at the destination, while IP is responsible for delivering the
packets from source to destination. When TCP and IP are bundled with higher-level applications
such as HTTP, FTP, Telnet, etc., TCP/IP refers to this whole suite of protocols.
Telnet
An interactive, character-based program used to access a remote computer. While HTTP (the
web protocol) and FTP only allow you to download files from a remote computer, Telnet allows
you to log into and use a computer from a remote location.
TFTP
Trivial File Transfer Protocol
A protocol for file transfers, TFTP is easier to use than File Transfer Protocol (FTP) but not as
capable or secure.
TKIP
Temporal Key Integrity Protocol (TKIP) provides WPA with a data encryption function. It ensures that
a unique master key is generated for each packet, supports message integrity and sequencing rules
and supports re-keying mechanisms.
Triggers
Triggers are used to deal with application protocols that create separate sessions. Some
applications, such as NetMeeting, open secondary connections during normal operations, for
example, a connection to a server is established using one port, but data transfers are performed on
a separate connection. A trigger tells the device to expect these secondary sessions and how to
handle them.
Once you set a trigger, the embedded IP address of each incoming packet is replaced by the correct
host address so that NAT can translate packets to the correct destination. You can specify whether
you want to carry out address replacement, and if so, whether to replace addresses on TCP packets
only, UDP packets only, or both.