Glossary
MoRoS ADSL 2.1 PRO
PPPoE:
Point to Point Protocol over Ethernet; a protocol, which connects two
devices via an Ethernet line to enable the exchange of TCP/IP packets
between those two machines.
Router:
This is a machine in a network, which is responsible for the incoming
data of a protocol to be forwarded to the planned destination or sub
network.
SCN:
Service Center Number, phone number of the computer that accepts
short messages (->SMS) via the GSM network and forwards them to
the recipients.
Server:
Device that provides services, e.g. web server, to other devices (cli-
ent).
SMS:
Short Message Service; short messages can be sent via the GSM cel-
lular network.
Socket:
Data connections that are established using ->TCP or ->UDP use
sockets for addressing. A socket consists of an IP address and a port
(cf. address: street name and number)
Switch:
A device that can connect several machines with the Ethernet. In con-
trast to a hub, a switch will "think” by itself, i.e. it can remember the
MAC addresses connected to a port and directs the traffic more effi-
ciently to the individual ports.
TCP:
Transmission Control Protocol; a transport protocol to enable data ex-
change between network devices. It operates "connection-based", i.t.
the data transmission is protected.
UDP:
User Datagram Protocol; a transport protocol to enable data exchange
between network devices. It operates "without connection", i.t. the
data transmission is not protected.
UMTS:
Universal Mobile Telecommunications System stands for the third
generation cellular standard (3G) that allows significantly higher data
transmission rates (384 kbit/s to 7,2 Mbit/s) than the second genera-
tion cellular standard (2G), the GSM standard (9,6 kbit/s to 220 kbit/s).
URL:
Uniform Resource Locator; this is the address used by a service to be
found in the web browser. In this manual, an URL is mostly entered as
the IP address of the device.
VPN:
Virtual Private Network; logical connections (so-called tunnels) are es-
tablished via existing unsafe connections. The end points of these
connections (tunnel ends) and the devices behind can be considered
as an independent logical network. A very high degree of tap- and
tamper-resistance can be achieved with the encryption of the data
transmission via the tunnels and the previous two-way authentication
of the partcipants at this logical network.
126