Omni 56K USB Lite
J
Glossary
Encryption
The act of substituting numbers and characters in a file so that the file is
unreadable until it is decrypted. Encryption is usually done using a
mathematical formula that determines how the file is decrypted.
EPROM
Electrically Programmable Read Only Memory. A memory chip that may be
programmed electronically, but must be exposed to ultraviolet radiation to be
erased.
Error
Correction
A method to compensate for errors which occurred in the transmission path.
Error correction is done by the modems and is transparent to the DTEs. The
most familiar correction methods are MNP5 and V.42bis.
Ethernet
A very common method of networking computers in a LAN. There are a number
of adaptations to the IEEE 802.3 Ethernet standard, including adaptations with
data rates of 10 Mbits/sec and 100 Mbits/sec over coaxial cable, twisted-pair
cable, and fiber-optic cable. The latest version of Ethernet, Gigabit Ethernet,
has a data rate of 1 Gbit/sec.
Events
These are network activities. Some activities are direct attacks on your system,
while others might be depending on the circumstances. Therefore, any activity,
regardless of severity is called an event. An event may or may not be a direct
attack on your system.
FAQ
(Frequently Asked Questions) - FAQs are documents that list and answer the
most common questions on a particular subject.
Fax
Long distance copy; facsimile - transfer of graphical data between two fax units.
The graphical data is compressed during transfer (G3).
FCC
The FCC (Federal Communications Commission) is in charge of allocating the
electromagnetic spectrum and thus the bandwidth of various communication
systems.
FIFO-Buffer
First-in-first-out buffer. A buffer of this type is used in the 16550 type UARTs
that allow higher data throughput rates on PCs.
Firmware
The ZyXEL modems' system software is located in flash EPROMs. Depending
on the size of the EPROM(s), some features may or may not be available.
Flash Memory
The nonvolatile storage that can be electrically erased and reprogrammed so
that data can be stored, booted, and rewritten as necessary.
Flow Control
Method to stop and start the data flow to avoid loss of data.