Chapter 5: Troubleshooting
Logs
Page
12
Term
Definition
Static IP Address
Assignment
Assignment of Internet Protocol address that can be changed only
manually. Thus, static IP address assignment requires more
configuration time and consumes more of the available IP addresses
than DHCP address assignment does. RFC 2050 provides guidelines for
the static allocation of IP addresses. See
http://www.faqs.org/rfcs/rfc2050.html. See also DHCP.
Subnet Mask
32-bit binary number that filters an IP address to reveal what part
identifies the network and what part identifies the host. The number of
subnet mask bits that are set to 1 indicates how many leading bits of the
IP address identify the network. The number of subnet mask bits that
are set 0 indicate how many trailing bits of the IP address identify the
host.
Subscriber Module
Customer premises equipment (CPE) device that extends network or
Internet services by communication with an Access Point Module or an
Access Point cluster.
Sustained Data Rate
Preset rate limit of data transfer.
Switch
Network element that uses the port that is associated with the physical
address of another to pass data to only the intended recipient. Compare
to Bridge and Router.
Sync
GPS (Global Positioning System) absolute time, which is passed from
one module to another. Sync enables timing that prevents modules
from
transmitting or receiving interference. Sync also
provides
correlative time stamps for troubleshooting efforts.
TCP
Alternatively known as Transmission Control Protocol or Transport
Control Protocol. The Transport Layer in the TCP/IP protocol stack. This
protocol is applied to assure that data packets arrive at the target
network element and to control the flow of data through the Internet.
Defined in RFC 793. See http
://www.faqs.org/rfcs/rfc793.html.
TDD
Time Division Duplexing. Synchronized data transmission with some
time slots allocated to devices transmitting on the uplink and some to
the device transmitting on the downlink.
telnet
Utility that allows a client computer to update a server. A firewall can
prevent the use of the telnet utility to breach the security of the server.
See http
://www.faqs.org/rfcs/rfc818.html,
//www.faqs.org/rfcs/rfc854.html and
/www.faqs.org/rfcs/rfc855.html.
Tokens
Theoretical amounts of data. See also Buckets.
TxUnderrun Field
This field displays how many transmission-underrun errors occurred on
the Ethernet controller.
Содержание PTP 450 Series
Страница 51: ...Chapter 1 Configuration Quick link setup Page 1 23...
Страница 155: ...Chapter 1 Configuration Configuring security Page 1 127...
Страница 160: ...Chapter 1 Configuration Configuring security Page 1 132 Table 41 Security attributes 450 Platform Family BHM...
Страница 163: ...Chapter 1 Configuration Configuring security Page 1 135...
Страница 164: ...Chapter 1 Configuration Configuring security Page 1 136...
Страница 169: ...Chapter 1 Configuration Configuring security Page 1 141 Table 43 Security attributes 450 Platform Family BHS...
Страница 193: ...Chapter 1 Configuration Configuring radio parameters Page 1 165...
Страница 194: ...Chapter 1 Configuration Configuring radio parameters Page 1 166...
Страница 195: ...Chapter 1 Configuration Configuring radio parameters Page 1 167...
Страница 206: ...Chapter 1 Configuration Configuring radio parameters Page 1 178...
Страница 210: ...Chapter 1 Configuration Configuring radio parameters Page 1 182...
Страница 232: ...Chapter 1 Configuration Configuring radio parameters Page 1 204 Figure 27 Multicast scheduler statistics...
Страница 305: ...Chapter 1 Configuration Configuring a RADIUS server Page 1 277 Table 89 Security tab attributes...
Страница 342: ...Chapter 1 Configuration Configuring a RADIUS server Page 1 314 6 Finally press Save Changes and you are ready to use it...
Страница 408: ...Chapter 3 Operation System information Page 3 8 Table 115 General Status page attributes PMP 450 AP...
Страница 423: ...Chapter 3 Operation System information Page 3 23 Site Contact Site Location Time Updated and Location Code...
Страница 636: ...Chapter 5 Troubleshooting Logs Page 5 16 Figure 95 SM Authorization log...