430
TKIP
TKIP is an acronym for
T
emporal
K
ey
I
ntegrity
P
rotocol. It used in WPA to replace WEP with a new encryption algorithm.
TKIP comprises the same encryption engine and RC4 algorithm defined for WEP. The key used for encryption in TKIP is
128 bits and changes the key used for each packet.
U
UDP
UDP is an acronym for
U
ser
D
atagram
P
rotocol. It is a communications protocol that uses the Internet Protocol (IP) to
exchange the messages between computers.
UDP is an alternative to the Transmission Control Protocol (TCP) that uses the Internet Protocol (IP). Unlike TCP, UDP
does not provide the service of dividing a message into packet datagrams, and UDP doesn't provide reassembling and
sequencing of the packets. This means that the application program that uses UDP must be able to make sure that the
entire message has arrived and is in the right order. Network applications that want to save processing time because they
have very small data units to exchange may prefer UDP to TCP.
UDP provides two services not provided by the IP layer. It provides port numbers to help distinguish different user requests
and, optionally, a checksum capability to verify that the data arrived intact.
Common network applications that use UDP include the Domain Name System (DNS), streaming media applications such
as IPTV, Voice over IP (VoIP), and Trivial File Transfer Protocol (TFTP).
UPnP
UPnP is an acronym for
U
niversal
P
lug and
P
lay. The goals of UPnP are to allow devices to connect seamlessly and to
simplify the implementation of networks in the home (data sharing, communications, and entertainment) and in corporate
environments for simplified installation of computer components
User Priority
User Priority is a 3-bit field storing the priority level for the 802.1Q frame.
V
VLAN
Virtual LAN. A method to restrict communication between switch ports. VLANs can be used for the following applications:
VLAN unaware switching:
This is the default configuration. All ports are VLAN unaware with Port VLAN ID 1 and
members of VLAN 1. This means that MAC addresses are learned in VLAN 1, and the switch does not remove or insert
VLAN tags.
Summary of Contents for NS4702-24P-4S-4X
Page 1: ...NS4702 24P 4S 4X User Manual P N 1072829 REV 00 01 ISS 14JUL14 ...
Page 23: ...23 Storage Temperature 10 70 degrees C Relative Humidity 5 95 non condensing ...
Page 164: ...164 Figure 4 8 2 Multicast Flooding ...
Page 183: ...183 Figure 4 8 14 IGMP Snooping VLAN Configuration Page Screenshot ...
Page 189: ...189 Figure 4 8 17 MLD Snooping Groups Information Page Screenshot ...
Page 208: ...208 Figure 4 9 6 QoS Egress Port Tag Remarking Page Screenshot ...
Page 218: ...218 Deletes the QCE The lowest plus sign adds a new entry at the bottom of the list of QCL ...
Page 229: ...229 Figure 4 9 18 Voice VLAN Configuration Page Screenshot ...
Page 299: ...299 Figure 4 11 17 Add User Properties Screen Figure 4 11 18 Add User Properties Screen ...
Page 336: ...336 Figure 4 14 2 LLDPMED Configuration Page Screenshot ...
Page 357: ...357 Figure 4 15 4 VeriPHY Cable Diagnostics Page Screenshot ...
Page 367: ...367 ...
Page 391: ...391 ...