Networking connection
NS3552-8P-2S-V2 User Manual
505
SSID
Service Set Identifier. It is a name used to identify the
particular 802.11 wireless LANs to which a user wants to
attach. A client device will receive broadcast messages from all
access points within range advertising their SSIDs, and can
choose one to connect to based on pre-configuration, or by
displaying a list of SSIDs in range and asking the user to select
one.
SSH
Secure Shell. It is a network protocol that allows data to be
exchanged using a secure channel between two networked
devices. The encryption used by SSH provides confidentiality
and integrity of data over an insecure network. The goal of
SSH was to replace the earlier rlogin, TELNET and rsh
protocols, which did not provide strong authentication or
guarantee confidentiality.
SSM
SSM In SyncE is an abbreviation for Synchronization Status
Message and contains a QL indication.
STP
Spanning Tree Protocol is an OSI layer-2 protocol which
ensures a loop free topology for any bridged LAN. The original
STP protocol is now obsoleted by RSTP.
SyncE
Synchronous Ethernet. This functionality is used to make a
network 'clock frequency' synchronized. Not to be confused
with real time clock synchronized (IEEE 1588).
T
Terminal Acess Controller Access Control System Plus. It is a
networking protocol that provides access control for routers,
network access servers, and other networked computing
devices via one or more centralized servers.
provides separate authentication, authorization, and
accounting services.
Tag Priority
Tag Priority is a 3-bit field storing the priority level for the
802.1Q frame.
TCP
Transmission Control Protocol. It is a communications protocol
that uses the Internet Protocol (IP) to exchange messages
between computers.
The TCP protocol guarantees reliable and in-order delivery of
data from sender to receiver and distinguishes data for multiple
connections by concurrent applications (for example, web
server and email server) running on the same host.
The applications on networked hosts can use TCP to create
connections to one another. It is known as a connection-
oriented protocol, which means that a connection is
established and maintained until such time as the message or
messages to be exchanged by the application programs at
each end have been exchanged. TCP is responsible for
ensuring that a message is divided into the packets that IP
manages and for reassembling the packets back into the
complete message at the other end.
Common network applications that use TCP include the World
Wide Web (WWW), email, and File Transfer Protocol (FTP).
Summary of Contents for NS3552-8P-2S-V2
Page 1: ...NS3552 8P 2S V2 User Manual P N 1073552 EN REV B ISS 25JAN19 ...
Page 41: ...Chapter 3 Switch management NS3552 8P 2S V2 User Manual 39 ...
Page 73: ...Chapter 4 Web configuration NS3552 8P 2S V2 User Manual 71 ...
Page 147: ...Chapter 4 Web configuration NS3552 8P 2S V2 User Manual 145 ...
Page 511: ......