![KeeNetic Lite KN-1310 Скачать руководство пользователя страница 297](http://html1.mh-extra.com/html/keenetic/lite-kn-1310/lite-kn-1310_command-reference-manual_3863741297.webp)
Transmission Control
Protocol
is a core protocol of the
suite. TCP provides reliable,
ordered, and error-checked delivery of a stream of octets between
applications running on hosts communicating over an IP network.
Tunnel Setup Protocol
is a networking control protocol used to negotiate IP tunnel setup
parameters between a tunnel client host and a tunnel broker server,
the tunnel end-points.
User Datagram Protocol
is a core protocol of the
suite. UDP uses a simple
connectionless transmission model with a minimum of protocol
mechanism. It has no handshaking dialogues, and thus exposes the
user's program to any unreliability of the underlying network protocol.
There is no guarantee of delivery, ordering, or duplicate protection.
Time-sensitive applications often use UDP because dropping packets
is preferable to waiting for delayed packets, which may not be an option
in a real-time system.
udpxy
is a UDP-to-HTTP multicast traffic relay daemon: it forwards UDP traffic
from a given multicast subscription to the requesting HTTP client.
Universal Plug and Play
is a standard that uses Internet and Web protocols to enable devices
such as PCs, peripherals, intelligent appliances, and wireless devices
to be plugged into a network and automatically know about each other.
With UPnP, when a user plugs a device into the network, the device
will configure itself, acquire a TCP/IP address, and use a discovery
protocol based on the HTTP to announce its presence on the network
to other devices.
Virtual LAN
is a local area network with a definition that maps workstations on
some other basis than geographic location (for example, by
department, type of user, or primary application). The virtual LAN
controller can change or add workstations and manage loadbalancing
and bandwidth allocation more easily than with a physical picture of
the LAN.
Web Proxy Auto-Discovery
Protocol
is a method used by clients to locate the URL of a configuration file
using DHCP and/or DNS discovery methods. Once detection and
download of the configuration file is complete, it can be executed to
determine the proxy for a specified URL.
Wi-Fi Multimedia
previously known as Wireless Multimedia Extensions (WME), is a subset
of the 802.11e wireless LAN (WLAN) specification that enhances quality
of service (QoS) on a network by prioritizing data packets according to
four access categories (AC). Ranging from highest priority to lowest,
these categories are: voice (AC_VO), video (AC_VI), best effort (AC_BE),
and background (AC_BK).
WMM also features a Power Save certification that helps small devices
on a network conserve battery life. Power Save allows small devices,
such as phones and PDAs, to transmit data while in a low-power
"dozing" status. The certification gives software developers and
hardware manufacturers a way to fine-tune battery use in the
ever-increasing number of small devices that have Wi-Fi capabilities.
Keenetic Lite (KN-1310) — Command Reference Guide
297
Glossary
Содержание Lite KN-1310
Страница 2: ......
Страница 6: ...Command Reference Guide Keenetic Lite KN 1310 6 Contents Overview...
Страница 18: ...Command Reference Guide Keenetic Lite KN 1310 18 Table of Contents...
Страница 20: ...Command Reference Guide Keenetic Lite KN 1310 20 Chapter 1 Product Overview...
Страница 26: ...Command Reference Guide Keenetic Lite KN 1310 26 Chapter 2 Introduction to the CLI...
Страница 314: ...Command Reference Guide Keenetic Lite KN 1310 314 Appendix C SNMP MIB...