or defined criteria to decide whether the packet may pass or if it needs
to be routed to a different destination, or, for the purpose of collecting
statistical information.
Deep Packet Inspection (and filtering) enables advanced network
management, user service, and security functions as well as internet
data mining, eavesdropping, and internet censorship. Although DPI
technology has been used for Internet management for many years,
some advocates of net neutrality fear that the technology may be used
anticompetitively or to reduce the openness of the Internet.
Open Package
lightweight package management system. It is intended for use on
embedded Linux devices and is used in this capacity in the
and
projects. Opkg packages use the
.ipk
extension.
Password Authentication
Protocol
is an authentication protocol that uses a password. PAP is used by
to validate users before allowing them access to
the remote network. PAP transmits unencrypted ASCII passwords over
the network and is therefore considered insecure.
Perfect Forward Secrecy
is a property of secure communication protocols: a secure
communication protocol is said to have forward secrecy if compromise
of long-term keys does not compromise past session keys. PFS protects
past sessions against future compromises of secret keys or passwords.
Ping Check
performs ICMP and TCP based tests to verify if the internet connection
is working fine. Test results may be used to switch between primary
and backup connections.
Point-to-Point Protocol
is a protocol used to establish a direct connection between two nodes.
It can provide connection authentication, transmission encryption, and
compression. PPP is used over many types of physical networks
including serial cable, phone line, cellular telephone, specialized radio
links, and fiber optic links. After the link has been established, additional
network (layer 3) configuration may take place. Most commonly, the
Internet Protocol Control Protocol
(IPCP) is used.
Preamble
it is the first part of the Physical Layer Convergence Protocol/Procedure
(PLCP) Protocol Data Unit (PDU). A header is the remaining part of the
data packets and has more information identifying the modulation
scheme, transmission rate, and length of time to transmit the whole
data frame.
The Preamble type in IEEE 802.11 based wireless communication
defines the length of the CRC (Cyclic Redundancy Check) block for
communication between the Access Point and roaming wireless
adapters.
Long preamble:
• PLCP with long preamble is transmitted at 1 Mbps regardless of
transmit rate of data frames
1
2
https://github.com/Entware-ng/Entware-ng
Command Reference Guide — Keenetic Extra (KN-1710)
328
Glossary
Summary of Contents for EXTRA KN-1710
Page 2: ......
Page 6: ...Command Reference Guide Keenetic Extra KN 1710 6 Contents Overview...
Page 20: ...Command Reference Guide Keenetic Extra KN 1710 20 Chapter 1 Product Overview...
Page 26: ...Command Reference Guide Keenetic Extra KN 1710 26 Chapter 2 Introduction to the CLI...
Page 322: ...Command Reference Guide Keenetic Extra KN 1710 322 Chapter 3 Command Reference...
Page 332: ...Command Reference Guide Keenetic Extra KN 1710 332 Glossary...
Page 348: ...Command Reference Guide Keenetic Extra KN 1710 348 Appendix C SNMP MIB...