427
TKIP is an acronym for
T
emporal
K
ey
I
ntegrity
P
rotocol. It used in WPA to replace WEP with a new encryption algorithm.
TKIP comprises the same encryption engine and RC4 algorithm defined for WEP. The key used for encryption in TKIP is
128 bits and changes the key used for each packet.
U
UDP
UDP is an acronym for
U
ser
D
atagram
P
rotocol. It is a communications protocol that uses the Internet Protocol (IP) to
exchange the messages between computers.
UDP is an alternative to the Transmission Control Protocol (TCP) that uses the Internet Protocol (IP). Unlike TCP, UDP
does not provide the service of dividing a message into packet datagrams, and UDP doesn't provide reassembling and
sequencing of the packets. This means that the application program that uses UDP must be able to make sure that the
entire message has arrived and is in the right order. Network applications that want to save processing time because
they have very small data units to exchange may prefer UDP to TCP.
UDP provides two services not provided by the IP layer. It provides port numbers to help distinguish different user
requests and, optionally, a checksum capability to verify that the data arrived intact.
Common network applications that use UDP include the Domain Name System (DNS), streaming media applications
such as IPTV, Voice over IP (VoIP), and Trivial File Transfer Protocol (TFTP).
UPnP
UPnP is an acronym for
U
niversal
P
lug and
P
lay. The goals of UPnP are to allow devices to connect seamlessly and to
simplify the implementation of networks in the home (data sharing, communications, and entertainment) and in corporate
environments for simplified installation of computer components
User Priority
User Priority is a 3-bit field storing the priority level for the 802.1Q frame. It is also known as PCP.
V
VLAN
It is Virtual LAN. It is a method to restrict communication between switch ports. VLANs can be used for the following
applications:
VLAN unaware switching:
This is the default configuration. All ports are VLAN unaware with Port VLAN ID 1 and
members of VLAN 1. This means that MAC addresses are learned in VLAN 1, and the switch does not remove or insert
VLAN tags.
Содержание NS4750-24S-4T-4X
Страница 1: ...NS4750 24S 4T 4X User Manual P N 1702826 REV 00 01 ISS 14JUL14 ...
Страница 56: ...56 Figure 4 2 7 Privilege Levels Configuration Page Screenshot ...
Страница 110: ...110 Figure 4 4 6 Mirror Configuration Page Screenshot ...
Страница 117: ...117 Figure 4 5 4 LACP Port Configuration Page Screenshot ...
Страница 136: ...136 Figure 4 6 5 VLAN Port Status for Static User Page Screenshot The Page includes the following fields ...
Страница 144: ...144 Figure 4 6 10 Change Port VLAN of Port 1 3 to be VLAN2 and Port VLAN of Port 4 6 to be VLAN3 ...
Страница 174: ...174 Figure 4 7 10 MST1 MSTI Port Configuration Page Screenshot ...
Страница 180: ...180 Figure 4 8 2 Multicast Flooding ...
Страница 249: ...249 Figure 4 9 18 Voice VLAN Configuration Page Screenshot ...
Страница 271: ...271 Counter Counts the number of frames that match this ACE ...
Страница 281: ...281 Figure 4 11 4 Network Access Server Configuration Page Screenshot ...
Страница 315: ...315 ...
Страница 328: ...328 ...
Страница 335: ...335 ...
Страница 346: ...346 Figure 4 14 1 LLDP Configuration Page Screenshot ...
Страница 350: ...350 Figure 4 14 2 LLDP MED Configuration Page Screenshot ...
Страница 372: ...372 Figure 4 16 1 Loop Protection Configuration Page Screenshot ...
Страница 377: ...377 Falling Threshold Falling threshold value 2147483648 2147483647 Falling Index Falling event index 1 65535 ...